ID

VAR-201611-0386


CVE

CVE-2016-5195


TITLE

Linux kernel memory subsystem copy on write mechanism contains a race condition vulnerability

Trust: 0.8

sources: CERT/CC: VU#243144

DESCRIPTION

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW.". Linux kernel is prone to a local privilege-escalation vulnerability. Local attackers may exploit this issue to gain elevated privileges. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: linux-image-4.4.0-45-generic 4.4.0-45.66~14.04.1 linux-image-4.4.0-45-generic-lpae 4.4.0-45.66~14.04.1 linux-image-4.4.0-45-lowlatency 4.4.0-45.66~14.04.1 linux-image-4.4.0-45-powerpc-e500mc 4.4.0-45.66~14.04.1 linux-image-4.4.0-45-powerpc-smp 4.4.0-45.66~14.04.1 linux-image-4.4.0-45-powerpc64-emb 4.4.0-45.66~14.04.1 linux-image-4.4.0-45-powerpc64-smp 4.4.0-45.66~14.04.1 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. Relevant releases/architectures: MRG Realtime for RHEL 6 Server v.2 - noarch, x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. (CVE-2016-5195, Important) * Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path; As an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2016:2105-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2105.html Issue date: 2016-10-25 CVE Names: CVE-2016-5195 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important) Red Hat would like to thank Phil Oester for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1384344 - CVE-2016-5195 kernel: mm: privilege escalation via MAP_PRIVATE COW breakage 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: kernel-2.6.32-642.6.2.el6.src.rpm i386: kernel-2.6.32-642.6.2.el6.i686.rpm kernel-debug-2.6.32-642.6.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm kernel-devel-2.6.32-642.6.2.el6.i686.rpm kernel-headers-2.6.32-642.6.2.el6.i686.rpm perf-2.6.32-642.6.2.el6.i686.rpm perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-642.6.2.el6.noarch.rpm kernel-doc-2.6.32-642.6.2.el6.noarch.rpm kernel-firmware-2.6.32-642.6.2.el6.noarch.rpm x86_64: kernel-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm kernel-devel-2.6.32-642.6.2.el6.x86_64.rpm kernel-headers-2.6.32-642.6.2.el6.x86_64.rpm perf-2.6.32-642.6.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm python-perf-2.6.32-642.6.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm python-perf-2.6.32-642.6.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: kernel-2.6.32-642.6.2.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-642.6.2.el6.noarch.rpm kernel-doc-2.6.32-642.6.2.el6.noarch.rpm kernel-firmware-2.6.32-642.6.2.el6.noarch.rpm x86_64: kernel-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm kernel-devel-2.6.32-642.6.2.el6.x86_64.rpm kernel-headers-2.6.32-642.6.2.el6.x86_64.rpm perf-2.6.32-642.6.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: kernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm python-perf-2.6.32-642.6.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: kernel-2.6.32-642.6.2.el6.src.rpm i386: kernel-2.6.32-642.6.2.el6.i686.rpm kernel-debug-2.6.32-642.6.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm kernel-devel-2.6.32-642.6.2.el6.i686.rpm kernel-headers-2.6.32-642.6.2.el6.i686.rpm perf-2.6.32-642.6.2.el6.i686.rpm perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-642.6.2.el6.noarch.rpm kernel-doc-2.6.32-642.6.2.el6.noarch.rpm kernel-firmware-2.6.32-642.6.2.el6.noarch.rpm ppc64: kernel-2.6.32-642.6.2.el6.ppc64.rpm kernel-bootwrapper-2.6.32-642.6.2.el6.ppc64.rpm kernel-debug-2.6.32-642.6.2.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm kernel-debug-devel-2.6.32-642.6.2.el6.ppc64.rpm kernel-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-642.6.2.el6.ppc64.rpm kernel-devel-2.6.32-642.6.2.el6.ppc64.rpm kernel-headers-2.6.32-642.6.2.el6.ppc64.rpm perf-2.6.32-642.6.2.el6.ppc64.rpm perf-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm s390x: kernel-2.6.32-642.6.2.el6.s390x.rpm kernel-debug-2.6.32-642.6.2.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.s390x.rpm kernel-debug-devel-2.6.32-642.6.2.el6.s390x.rpm kernel-debuginfo-2.6.32-642.6.2.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-642.6.2.el6.s390x.rpm kernel-devel-2.6.32-642.6.2.el6.s390x.rpm kernel-headers-2.6.32-642.6.2.el6.s390x.rpm kernel-kdump-2.6.32-642.6.2.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-642.6.2.el6.s390x.rpm kernel-kdump-devel-2.6.32-642.6.2.el6.s390x.rpm perf-2.6.32-642.6.2.el6.s390x.rpm perf-debuginfo-2.6.32-642.6.2.el6.s390x.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.s390x.rpm x86_64: kernel-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm kernel-devel-2.6.32-642.6.2.el6.x86_64.rpm kernel-headers-2.6.32-642.6.2.el6.x86_64.rpm perf-2.6.32-642.6.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm python-perf-2.6.32-642.6.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm kernel-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-642.6.2.el6.ppc64.rpm perf-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm python-perf-2.6.32-642.6.2.el6.ppc64.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-642.6.2.el6.s390x.rpm kernel-debuginfo-2.6.32-642.6.2.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-642.6.2.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-642.6.2.el6.s390x.rpm perf-debuginfo-2.6.32-642.6.2.el6.s390x.rpm python-perf-2.6.32-642.6.2.el6.s390x.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm python-perf-2.6.32-642.6.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: kernel-2.6.32-642.6.2.el6.src.rpm i386: kernel-2.6.32-642.6.2.el6.i686.rpm kernel-debug-2.6.32-642.6.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm kernel-devel-2.6.32-642.6.2.el6.i686.rpm kernel-headers-2.6.32-642.6.2.el6.i686.rpm perf-2.6.32-642.6.2.el6.i686.rpm perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-642.6.2.el6.noarch.rpm kernel-doc-2.6.32-642.6.2.el6.noarch.rpm kernel-firmware-2.6.32-642.6.2.el6.noarch.rpm x86_64: kernel-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm kernel-devel-2.6.32-642.6.2.el6.x86_64.rpm kernel-headers-2.6.32-642.6.2.el6.x86_64.rpm perf-2.6.32-642.6.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm python-perf-2.6.32-642.6.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm python-perf-2.6.32-642.6.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5195 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/2706661 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD4DBQFYEJcBXlSAg2UNWIIRAiWLAKCCzQq/hlgGpFbZwm1VmGEtsf8qbwCYhOVp coEi7YBOAF6JIj/7g1jNNg== =enSu -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================== Kernel Live Patch Security Notice LSN-0021-1 April 10, 2017 linux vulnerability ========================================================================== A security issue affects these releases of Ubuntu: | Series | Base kernel | Arch | flavors | |------------------+--------------+----------+------------------| | Ubuntu 16.04 LTS | 4.4.0 | amd64 | generic | | Ubuntu 16.04 LTS | 4.4.0 | amd64 | lowlatency | Summary: Several security issues were fixed in the kernel. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2016-7916) Qidan He discovered that the ICMP implementation in the Linux kernel did not properly check the size of an ICMP header. A local attacker with CAP_NET_ADMIN could use this to expose sensitive information. (CVE-2016-8399) It was discovered that the KVM implementation for x86/x86_64 in the Linux kernel could dereference a null pointer. An attacker in a guest virtual machine could use this to cause a denial of service (system crash) in the KVM host. (CVE-2016-8630) Eyal Itkin discovered that the IP over IEEE 1394 (FireWire) implementation in the Linux kernel contained a buffer overflow when handling fragmented packets. A remote attacker could use this to possibly execute arbitrary code with administrative privileges. (CVE-2016-8633) CAI Qian discovered that the sysctl implementation in the Linux kernel did not properly perform reference counting in some situations. (CVE-2016-9191) Andrey Konovalov discovered that the SCTP implementation in the Linux kernel improperly handled validation of incoming data. (CVE-2016-9555) Dmitry Vyukov discovered that the KVM implementation in the Linux kernel did not properly initialize the Code Segment (CS) in certain error cases. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2016-9756) Andy Lutomirski and Willy Tarreau discovered that the KVM implementation in the Linux kernel did not properly emulate instructions on the SS segment register. A local attacker in a guest virtual machine could use this to cause a denial of service (guest OS crash) or possibly gain administrative privileges in the guest OS. (CVE-2017-2583) Update instructions: The problem can be corrected by updating your livepatches to the following versions: | Kernel | Version | flavors | |-----------------+----------+--------------------------| | 4.4.0-21.37 | 16.1 | generic, lowlatency | | 4.4.0-21.37 | 17.1 | generic, lowlatency | | 4.4.0-21.37 | 18.1 | generic, lowlatency | | 4.4.0-21.37 | 21.1 | generic, lowlatency | | 4.4.0-22.39 | 13.2 | generic, lowlatency | | 4.4.0-22.39 | 16.1 | generic, lowlatency | | 4.4.0-22.39 | 17.1 | generic, lowlatency | | 4.4.0-22.39 | 18.1 | generic, lowlatency | | 4.4.0-22.39 | 21.1 | generic, lowlatency | | 4.4.0-22.40 | 16.1 | generic, lowlatency | | 4.4.0-22.40 | 17.1 | generic, lowlatency | | 4.4.0-22.40 | 18.1 | generic, lowlatency | | 4.4.0-22.40 | 21.1 | generic, lowlatency | | 4.4.0-24.43 | 16.1 | generic, lowlatency | | 4.4.0-24.43 | 17.1 | generic, lowlatency | | 4.4.0-24.43 | 18.1 | generic, lowlatency | | 4.4.0-24.43 | 21.1 | generic, lowlatency | | 4.4.0-28.47 | 16.1 | generic, lowlatency | | 4.4.0-28.47 | 17.1 | generic, lowlatency | | 4.4.0-28.47 | 18.1 | generic, lowlatency | | 4.4.0-28.47 | 21.1 | generic, lowlatency | | 4.4.0-31.50 | 16.1 | generic, lowlatency | | 4.4.0-31.50 | 17.1 | generic, lowlatency | | 4.4.0-31.50 | 18.1 | generic, lowlatency | | 4.4.0-31.50 | 21.1 | generic, lowlatency | | 4.4.0-34.53 | 16.1 | generic, lowlatency | | 4.4.0-34.53 | 17.1 | generic, lowlatency | | 4.4.0-34.53 | 18.1 | generic, lowlatency | | 4.4.0-34.53 | 21.1 | generic, lowlatency | | 4.4.0-36.55 | 16.1 | generic, lowlatency | | 4.4.0-36.55 | 17.1 | generic, lowlatency | | 4.4.0-36.55 | 18.1 | generic, lowlatency | | 4.4.0-36.55 | 21.1 | generic, lowlatency | | 4.4.0-38.57 | 16.1 | generic, lowlatency | | 4.4.0-38.57 | 17.1 | generic, lowlatency | | 4.4.0-38.57 | 18.1 | generic, lowlatency | | 4.4.0-38.57 | 21.1 | generic, lowlatency | | 4.4.0-42.62 | 16.1 | generic, lowlatency | | 4.4.0-42.62 | 17.1 | generic, lowlatency | | 4.4.0-42.62 | 18.1 | generic, lowlatency | | 4.4.0-42.62 | 21.1 | generic, lowlatency | | 4.4.0-43.63 | 16.1 | generic, lowlatency | | 4.4.0-43.63 | 17.1 | generic, lowlatency | | 4.4.0-43.63 | 18.1 | generic, lowlatency | | 4.4.0-43.63 | 21.1 | generic, lowlatency | | 4.4.0-45.66 | 16.1 | generic, lowlatency | | 4.4.0-45.66 | 17.1 | generic, lowlatency | | 4.4.0-45.66 | 18.1 | generic, lowlatency | | 4.4.0-45.66 | 21.1 | generic, lowlatency | | 4.4.0-47.68 | 16.1 | generic, lowlatency | | 4.4.0-47.68 | 17.1 | generic, lowlatency | | 4.4.0-47.68 | 18.1 | generic, lowlatency | | 4.4.0-47.68 | 21.1 | generic, lowlatency | | 4.4.0-51.72 | 16.1 | generic, lowlatency | | 4.4.0-51.72 | 17.1 | generic, lowlatency | | 4.4.0-51.72 | 18.1 | generic, lowlatency | | 4.4.0-51.72 | 21.1 | generic, lowlatency | | 4.4.0-53.74 | 16.1 | generic, lowlatency | | 4.4.0-53.74 | 17.1 | generic, lowlatency | | 4.4.0-53.74 | 18.1 | generic, lowlatency | | 4.4.0-53.74 | 21.1 | generic, lowlatency | | 4.4.0-57.78 | 17.1 | generic, lowlatency | | 4.4.0-57.78 | 18.1 | generic, lowlatency | | 4.4.0-57.78 | 21.1 | generic, lowlatency | | 4.4.0-59.80 | 17.1 | generic, lowlatency | | 4.4.0-59.80 | 18.1 | generic, lowlatency | | 4.4.0-59.80 | 21.1 | generic, lowlatency | | 4.4.0-62.83 | 17.1 | generic, lowlatency | | 4.4.0-62.83 | 18.1 | generic, lowlatency | | 4.4.0-62.83 | 21.1 | generic, lowlatency | | 4.4.0-63.84 | 18.1 | generic, lowlatency | | 4.4.0-63.84 | 21.1 | generic, lowlatency | | 4.4.0-64.85 | 21.1 | generic, lowlatency | | 4.4.0-66.87 | 21.1 | generic, lowlatency | | 4.4.0-67.88 | 21.1 | generic, lowlatency | | 4.4.0-70.91 | 21.1 | generic, lowlatency | | 4.4.0-71.92 | 21.1 | generic, lowlatency | Additionally, you should install an updated kernel with these fixes and reboot at your convienience. 6.5) - noarch, x86_64 3. Security Fix(es): * A flaw was found in the Linux kernel's keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation. Enhancement(s): * This update fixes a tape write problem by fixing the use of the sas_is_tlr_enabled API in the mpt3sas driver. The driver now checks whether Transport Layer Recovery (TLR) is enabled before enabling the MPI2_SCSIIO_CONTROL_TLR_ON flag. (BZ#1372352) 4

Trust: 2.7

sources: NVD: CVE-2016-5195 // CERT/CC: VU#243144 // BID: 93793 // VULMON: CVE-2016-5195 // PACKETSTORM: 139316 // PACKETSTORM: 139253 // PACKETSTORM: 139336 // PACKETSTORM: 139334 // PACKETSTORM: 142151 // PACKETSTORM: 139369 // PACKETSTORM: 139439 // PACKETSTORM: 139438

AFFECTED PRODUCTS

vendor:redhatmodel:enterprise linuxscope:eqversion:5

Trust: 1.3

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.2.83

Trust: 1.0

vendor:redhatmodel:enterprise linux ausscope:eqversion:6.5

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.1

Trust: 1.0

vendor:netappmodel:ontap select deploy administration utilityscope:eqversion: -

Trust: 1.0

vendor:netappmodel:oncommand performance managerscope:eqversion: -

Trust: 1.0

vendor:netappmodel:solidfirescope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.8

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.10.104

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.10

Trust: 1.0

vendor:redhatmodel:enterprise linux ausscope:eqversion:6.2

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:netappmodel:cloud backupscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.4.113

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.11

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:gteversion:5.1

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.1.35

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.17

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:23

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.8.3

Trust: 1.0

vendor:netappmodel:oncommand balancescope:eqversion: -

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:ltversion:7.1.8

Trust: 1.0

vendor:redhatmodel:enterprise linux ausscope:eqversion:6.4

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:netappmodel:hci storage nodesscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:6.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.2

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.5

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.7.9

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:6.7

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.5

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.3

Trust: 1.0

vendor:netappmodel:snapprotectscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:2.6.22

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.19

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:24

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.4.26

Trust: 1.0

vendor:redhatmodel:enterprise linux tusscope:eqversion:6.5

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.18.44

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.13

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:6.6

Trust: 1.0

vendor:redhatmodel:enterprise linux long lifescope:eqversion:5.6

Trust: 1.0

vendor:netappmodel:oncommand unified manager for clustered data ontapscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.16.38

Trust: 1.0

vendor:redhatmodel:enterprise linux long lifescope:eqversion:5.9

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:ltversion:7.0.14

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:25

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:gteversion:7.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.12.66

Trust: 1.0

vendor:centosmodel: - scope: - version: -

Trust: 0.8

vendor:coreosmodel: - scope: - version: -

Trust: 0.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel:paging serverscope:eqversion:0

Trust: 0.6

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.62

Trust: 0.3

vendor:hpmodel:msr95xscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.9.110.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24.6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.114

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:9.1

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.11

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.15

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.117

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:32.0.1700.95

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.22

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.112

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001sph002scope:neversion:8800

Trust: 0.3

vendor:hpmodel:(comware r2122scope:eqversion:79007)

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.46

Trust: 0.3

vendor:vmwaremodel:identity managerscope:eqversion:2.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.52

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.28.4

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.89

Trust: 0.3

vendor:ciscomodel:video surveillance media serverscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.36

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.13

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.80

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.155

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.15

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.39

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.4

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5.1.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.26.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.16

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5.1.131

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.36

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59507)0

Trust: 0.3

vendor:ibmmodel:powerkvmscope:eqversion:3.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.25

Trust: 0.3

vendor:ciscomodel:ip interoperability and collaboration systemscope:eqversion:0

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c00scope:eqversion:7800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.80

Trust: 0.3

vendor:hpmodel:5130ei (comwarescope:eqversion:7)0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.12

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.10

Trust: 0.3

vendor:ciscomodel:edge digital media playerscope:eqversion:3400

Trust: 0.3

vendor:redhatmodel:enterprise linux client optionalscope:eqversion:7

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c10scope:eqversion:12800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.4

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.2

Trust: 0.3

vendor:huaweimodel:cloudengine v100r002c00scope:eqversion:12800

Trust: 0.3

vendor:cloudmodel:linux cloudlinuxosscope:eqversion:7

Trust: 0.3

vendor:hpmodel:12900escope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernel 3.19-rc7scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31.6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.27

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.170

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:neversion:7.0.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38.2

Trust: 0.3

vendor:hpmodel:6127xlgscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:jabber guestscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.65

Trust: 0.3

vendor:ciscomodel:vds recorderscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:vrealize operationsscope:eqversion:6.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.4

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001c00scope:eqversion:12800

Trust: 0.3

vendor:ciscomodel:visual quality experience serverscope:eqversion:0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:junipermodel:junos space 15.1f2scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.32

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:neversion:7.1.8

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.2

Trust: 0.3

vendor:linuxmodel:kernel 4.4-rc1scope: - version: -

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.0

Trust: 0.3

vendor:virtuozzomodel:containers for linuxscope:eqversion:4.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24.3

Trust: 0.3

vendor:ubuntumodel:linuxscope:eqversion:16.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.45

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.42

Trust: 0.3

vendor:huaweimodel:ar3200 v200r006c15scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.31

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1164.1

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:8.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.121

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.88

Trust: 0.3

vendor:linuxmodel:kernel 4.1-rc6scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.48

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.3

Trust: 0.3

vendor:huaweimodel:cloudengine v100r006c00scope:eqversion:8800

Trust: 0.3

vendor:vmwaremodel:vrealize operationsscope:eqversion:6.3.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59307)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.120

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.63-2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.9

Trust: 0.3

vendor:susemodel:linux enterprise server sp2 ltssscope:eqversion:11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.22

Trust: 0.3

vendor:hpmodel:msr3000 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:hpmodel:msr2000 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.10

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node eusscope:eqversion:7.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.38

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.34

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1.15

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.49

Trust: 0.3

vendor:redhatmodel:enterprise linux clientscope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.11

Trust: 0.3

vendor:junipermodel:junos space 15.1r2.11scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:8.0.552.342

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.53

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38.6

Trust: 0.3

vendor:ciscomodel:scosscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.48

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.57

Trust: 0.3

vendor:linuxmodel:kernel 4.1-rc1scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.48

Trust: 0.3

vendor:coreosmodel:linuxscope:neversion:1192.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.37

Trust: 0.3

vendor:linuxmodel:kernel 3.14-rc4scope: - version: -

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1164.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:9.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.16

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node eusscope:eqversion:7.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.2.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.49

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.11

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.13

Trust: 0.3

vendor:mcafeemodel:email gateway 7.6.2h968406scope: - version: -

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.66

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.8

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.49

Trust: 0.3

vendor:ciscomodel:common services platform collectorscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:vds-tv streamerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.31

Trust: 0.3

vendor:hpmodel:5510hiscope:eqversion:0

Trust: 0.3

vendor:hpmodel:6125xlgscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.7

Trust: 0.3

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.124

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.0.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.169

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.34

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.47

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.14

Trust: 0.3

vendor:cloudmodel:linux cloudlinuxosscope:eqversion:6.0

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.405

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.26

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.54

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c10scope:eqversion:6800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.2

Trust: 0.3

vendor:huaweimodel:ar3200 v200r008c20spc700scope:neversion: -

Trust: 0.3

vendor:susemodel:linux enterprise server 11-extrascope: - version: -

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.11

Trust: 0.3

vendor:linuxmodel:kernel 3.19-rcscope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise module for public cloudscope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.18

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.54

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.21

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.87

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.6

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.46

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.81

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.90

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.99

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.168

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.53

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.33

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.9

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:75007)0

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:12.3

Trust: 0.3

vendor:hpmodel:propelscope:eqversion:2.20

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.41

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5.0.997

Trust: 0.3

vendor:ciscomodel:prime network change and configuration managementscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.71

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.16

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.9.128.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.67

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.40

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.26

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.65

Trust: 0.3

vendor:ciscomodel:ucs directorscope:eqversion:0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.70

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.37

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.12

Trust: 0.3

vendor:junipermodel:junos space 15.2r1scope: - version: -

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:105007)0

Trust: 0.3

vendor:linuxmodel:kernel 4.4-rc4scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14-4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.81

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.26

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.23

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.110

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.28

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3.5

Trust: 0.3

vendor:linuxmodel:kernel 3.9-rc3scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.108

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.95

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.8

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:ibmmodel:powerkvmscope:eqversion:2.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.19

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:129007)0

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.1

Trust: 0.3

vendor:linuxmodel:kernel 3.13-rc1scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.45

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.29

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.62

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.116

Trust: 0.3

vendor:hpmodel:msr1000 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.17

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1192.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.67

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.62

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.115

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.2

Trust: 0.3

vendor:ciscomodel:videoscape distribution suite service managerscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.2.8

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:8.1.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.14

Trust: 0.3

vendor:ciscomodel:dx series ip phonesscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.56

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.33

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.76

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.39

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.1

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernel 3.9-rc8scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.2

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:79007)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.78

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.28

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:35.0.1916.155

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.38

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.2

Trust: 0.3

vendor:vmwaremodel:vrealize operations 6.2.0ascope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.24

Trust: 0.3

vendor:huaweimodel:cloudengine v100r006c00scope:eqversion:6800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.57

Trust: 0.3

vendor:linuxmodel:kernelscope:neversion:4.7.9

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.88

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.44

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.27

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp1scope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.82

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.15

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.70

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.404

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.51

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.9

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c10scope:eqversion:12800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:8.0.552.344

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.55

Trust: 0.3

vendor:ciscomodel:spa122 analog telephone adapter with routerscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernel 3.8-rc1scope: - version: -

Trust: 0.3

vendor:virtuozzomodel:virtuozzoscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:connected grid routersscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10.0.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.2

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c10scope:eqversion:7800

Trust: 0.3

vendor:susemodel:linux enterprise point of sale 11-sp3scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.72

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.8

Trust: 0.3

vendor:susemodel:linux enterprise server 12-ltssscope: - version: -

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.21

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.401

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.81

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.14

Trust: 0.3

vendor:susemodel:linux enterprise software development kit sp1scope:eqversion:12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:37.0.2062.119

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.54

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.123

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.50

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.37

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.3.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25.2

Trust: 0.3

vendor:googlemodel:android onescope:eqversion:0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.4

Trust: 0.3

vendor:mcafeemodel:email gateway 7.6.405h1165239scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.36

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.59

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.3

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001c00scope:eqversion:7800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.50

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.11

Trust: 0.3

vendor:linuxmodel:kernel 3.19-rc2scope: - version: -

Trust: 0.3

vendor:ciscomodel:series digital media playersscope:eqversion:44000

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.113

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.60

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.35

Trust: 0.3

vendor:ciscomodel:ata series analog terminal adaptorsscope:eqversion:1900

Trust: 0.3

vendor:susemodel:linux enterprise server sp3 ltssscope:eqversion:11

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.40

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:susemodel:linux enterprise server for sapscope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.14

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001c00scope:eqversion:8800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.48

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.18

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59007)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.41

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.72

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.12

Trust: 0.3

vendor:ciscomodel:unified communications manager session management editionscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux mrgscope:eqversion:2

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.32

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.6

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10.1.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.75

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.24

Trust: 0.3

vendor:cloudmodel:linux cloudlinuxosscope:eqversion:5.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.66

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5(.1.131)

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.32

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.38

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:12.04

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:13.3

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1153.4

Trust: 0.3

vendor:ciscomodel:prime access registrarscope:eqversion:0

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.3.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.62

Trust: 0.3

vendor:coreosmodel:linuxscope:neversion:1122.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.64

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.63

Trust: 0.3

vendor:hpmodel:moonshotscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:48.0.2564.116

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.11

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.37

Trust: 0.3

vendor:junipermodel:junos space 15.2r2scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.53

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.7

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.1

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:16.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.93

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.7

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1

Trust: 0.3

vendor:ciscomodel:onepk all-in-one virtual machinescope:eqversion:0

Trust: 0.3

vendor:susemodel:linux enterprise debuginfo sp4scope:eqversion:11

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.61

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.41

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:28.0.1500.71

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.1

Trust: 0.3

vendor:susemodel:linux enterprise workstation extension sp1scope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:linuxmodel:kernel 3.9-rc7scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.51

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.57

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27.49

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15.5

Trust: 0.3

vendor:huaweimodel:fusioncube v100r002c60spc100scope:neversion: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:28.0.1500.95

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.21

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.6.1.30

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.7

Trust: 0.3

vendor:ciscomodel:vds-tv vaultscope:eqversion:0

Trust: 0.3

vendor:huaweimodel:cloudengine v100r006c00scope:eqversion:12800

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.31

Trust: 0.3

vendor:linuxmodel:kernel 3.11-rc7scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.40

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.8

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1153.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9

Trust: 0.3

vendor:hpmodel:hsr6600 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1183.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.0.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.14

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.39

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.18

Trust: 0.3

vendor:ciscomodel:spa232d multi-line dect analog telephone adapterscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11

Trust: 0.3

vendor:googlemodel:chrome osscope:neversion:54.0.2840.79

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.37

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.171

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.73

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.57

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.79

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.19

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.13

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:9.0.1

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:10.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.73

Trust: 0.3

vendor:ciscomodel:dcm series d990x digital content managerscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14-1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.156

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.1

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.10

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.56

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.3

Trust: 0.3

vendor:opensusemodel:leapscope:eqversion:42.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30.3

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.64

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:57007)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.58

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1192.2

Trust: 0.3

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.33

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.54

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.56

Trust: 0.3

vendor:junipermodel:junos space 14.1r1.9scope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.14

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.154

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.25

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.6

Trust: 0.3

vendor:susemodel:linux enterprise server sp1scope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.172

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.30

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.9

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c00scope:eqversion:6800

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001sph002scope:neversion:6800

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.14

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.43

Trust: 0.3

vendor:vmwaremodel:vrealize operationsscope:eqversion:6.1.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35.13

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:33.0.1750.152

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.18

Trust: 0.3

vendor:linuxmodel:kernel 3.11-rc1scope: - version: -

Trust: 0.3

vendor:vmwaremodel:identity managerscope:eqversion:2.7

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:8.1.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.61

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.43

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.1

Trust: 0.3

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.8

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.403

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.26

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.44

Trust: 0.3

vendor:linuxmodel:kernel 4.4-rc5scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.10

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.0

Trust: 0.3

vendor:hpmodel:vsr (comwarescope:eqversion:7)0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.152

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.73

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.55

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.65

Trust: 0.3

vendor:huaweimodel:ar3200 v200r006c13scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernel 3.0-rc1scope: - version: -

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.1

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59207)0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.7

Trust: 0.3

vendor:ciscomodel:smart net total care onpremscope:eqversion:-0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.54

Trust: 0.3

vendor:virtuozzomodel:update hotfixscope:neversion:6.011

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c00scope:eqversion:6800

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.7

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.18

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.11

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5

Trust: 0.3

vendor:ibmmodel:powerkvm updatescope:neversion:2.1.1.3-6513

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:spa112 2-port phone adapterscope:eqversion:0

Trust: 0.3

vendor:junipermodel:junos space 16.1r1scope:neversion: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.161

Trust: 0.3

vendor:vmwaremodel:vrealize operationsscope:eqversion:6.0.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9.8

Trust: 0.3

vendor:huaweimodel:fusioncube v100r002c60rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.42

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.30

Trust: 0.3

vendor:huaweimodel:ar3200 v200r006c12scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.38.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.32

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.23

Trust: 0.3

vendor:ciscomodel:telepresence video communication serverscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.43

Trust: 0.3

vendor:hpmodel:hsr6800 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:23.0.1271.94

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:ibmmodel:powerkvm updatescope:neversion:3.1.0.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.3

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:7

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1185.0

Trust: 0.3

vendor:susemodel:manager proxyscope:eqversion:2.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.9

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5.1.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.41

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.91

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.26

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.46

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.4

Trust: 0.3

vendor:linuxmodel:kernel 3.7-rc1scope: - version: -

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c10scope:eqversion:7800

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.31

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.18

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.19

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.39

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.4

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.10.140.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.5

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.58

Trust: 0.3

vendor:hpmodel:propelscope:eqversion:2.01

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.28

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.8

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.9.134.14

Trust: 0.3

vendor:ciscomodel:ata analog telephone adaptorscope:eqversion:1870

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.29

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.10

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.76

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:13.1

Trust: 0.3

vendor:ciscomodel:expressway seriesscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.21

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.1

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:12.1

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.3.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.15

Trust: 0.3

vendor:ibmmodel:security guardiumscope:eqversion:8.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.79

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.12

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.74

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.9.131.0

Trust: 0.3

vendor:ciscomodel:edge digital media playerscope:eqversion:3000

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.2.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.7

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.2.4.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.63

Trust: 0.3

vendor:huaweimodel:ar3200 v200r007c00scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.6

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c00scope:eqversion:12800

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001sph002scope:neversion:12800

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.4.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.13

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:vds-tv caching nodesscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.5

Trust: 0.3

vendor:hpmodel:helion openstackscope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.19

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.20

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.55

Trust: 0.3

vendor:susemodel:openstack cloudscope:eqversion:5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.72

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.12

Trust: 0.3

vendor:hpmodel:helion openstackscope:neversion:4.0.1

Trust: 0.3

vendor:huaweimodel:ar3200 v200r006c10scope: - version: -

Trust: 0.3

vendor:ciscomodel:series digital media playersscope:eqversion:43000

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.16

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.82

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.38

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.55

Trust: 0.3

vendor:susemodel:linux enterprise server sp4scope:eqversion:11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.37.2

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.90

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.25

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.52

Trust: 0.3

vendor:linuxmodel:kernelscope:neversion:4.8.3

Trust: 0.3

vendor:coreosmodel:linuxscope:neversion:1185.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.1.8

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:1.5(.1.6)

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.0

Trust: 0.3

vendor:linuxmodel:kernel 3.14-rc7scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.11

Trust: 0.3

vendor:linuxmodel:kernel 4.3-rc1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:0.9.126.0

Trust: 0.3

vendor:linuxmodel:kernel 4.1-rc3scope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.1.3

Trust: 0.3

vendor:huaweimodel:cloudengine v100r005c00scope:eqversion:12800

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.25

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.5

Trust: 0.3

vendor:hpmodel:propelscope:eqversion:1.01

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:6.1

Trust: 0.3

vendor:virtuozzomodel:server bare metalscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.159

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.68

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.20

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.34

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.24

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.30

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.93

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.38

Trust: 0.3

vendor:ciscomodel:prime collaboration provisioningscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.50

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:5

Trust: 0.3

vendor:ciscomodel:nexus series fabric switches aci modescope:eqversion:9000-0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.84

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.51

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.86

Trust: 0.3

vendor:huaweimodel:cloudengine v100r006c00scope:eqversion:7800

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.173

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.29

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.34

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.7

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1185.1

Trust: 0.3

vendor:susemodel:managerscope:eqversion:2.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.45

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.44

Trust: 0.3

vendor:hpmodel:helion openstackscope:eqversion:3.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.7

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.37

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:3.1.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.54

Trust: 0.3

vendor:hpmodel:5130hiscope:eqversion:0

Trust: 0.3

vendor:susemodel:linux enterprise debuginfo sp3scope:eqversion:11

Trust: 0.3

vendor:hpmodel:propelscope:eqversion:2.10

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:neversion:10.0.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.2

Trust: 0.3

vendor:googlemodel:nexus playerscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.20

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.126

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.60

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.78

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.49

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.9

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.26

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.21

Trust: 0.3

vendor:ciscomodel:cloud object storagescope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.19.3

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.4

Trust: 0.3

vendor:junipermodel:junos space 14.1r1scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.20

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.6

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.2

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.7

Trust: 0.3

vendor:linuxmodel:kernel 4.1-rc7scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.18

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.118

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.75

Trust: 0.3

vendor:susemodel:linux enterprise live patchingscope:eqversion:12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.58

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.15

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.44

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.70

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.52

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.5

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.31

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.50

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.72

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.87

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.35

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.81

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:neversion:6.1.17

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.92

Trust: 0.3

vendor:ciscomodel:application policy infrastructure controllerscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.37

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.10

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:19507)0

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:125007)0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.36

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:9.0.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.86

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.47

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.60

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.85

Trust: 0.3

vendor:huaweimodel:ar3200 v200r006c16scope: - version: -

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.0

Trust: 0.3

vendor:linuxmodel:kernel 3.11-rc4scope: - version: -

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:40.0.2214.114

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.24

Trust: 0.3

vendor:hpmodel:helion openstackscope:neversion:3.0.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:53.0.2785.103

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.42

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.51

Trust: 0.3

vendor:vmwaremodel:vrealize automationscope:eqversion:7.1

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.56

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:8.0.552.343

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.17

Trust: 0.3

vendor:linuxmodel:kernelscope:neversion:4.4.26

Trust: 0.3

vendor:ciscomodel:webex meetings server 2.5mr2scope: - version: -

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c10scope:eqversion:6800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.42

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.7

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:52.0.2743.85

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.125

Trust: 0.3

vendor:huaweimodel:cloudengine v100r002c00scope:eqversion:6800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.11

Trust: 0.3

vendor:vmwaremodel:vrealize operationsscope:eqversion:6.2.1

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.400

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:1.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.20

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.19

Trust: 0.3

vendor:linuxmodel:kernel 3.17-rc3scope: - version: -

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59407)0

Trust: 0.3

vendor:ciscomodel:prime service catalog virtual appliancescope:eqversion:0

Trust: 0.3

vendor:hpmodel:propelscope:eqversion:1.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.22

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:48.0.2564.92

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.14

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.52

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:7.0.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.35.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.18

Trust: 0.3

vendor:coreosmodel:linuxscope:eqversion:1180.0

Trust: 0.3

vendor:ciscomodel:prime data center network managerscope:eqversion: -

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001c00scope:eqversion:6800

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364160

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.51

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.28

Trust: 0.3

vendor:ciscomodel:mxe series media experience enginesscope:eqversion:35000

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.3

Trust: 0.3

vendor:ciscomodel:videoscape distribution suite video recordingscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.31.4

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:53.0.2785.144

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.69

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.45

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.36

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.32.8

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:neversion:7.6.406-3402.103

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.23

Trust: 0.3

vendor:ciscomodel:webex meetings server mr1scope:eqversion:2.5

Trust: 0.3

vendor:hpmodel:msr4000 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:ciscomodel:webex meetings serverscope:eqversion:2.5.99.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.29

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.122

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.35

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:5.1.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.36

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.47

Trust: 0.3

vendor:hpmodel:helion cloudsystemscope:eqversion:9.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.6

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.77

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.98

Trust: 0.3

vendor:ciscomodel:visual quality experience tools serverscope:eqversion:0

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.00

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.119

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:11.2

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:20.0.1132.17

Trust: 0.3

vendor:mcafeemodel:email gateway 7.6.405h1157986scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30.5

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:7

Trust: 0.3

vendor:susemodel:linux enterprise software development kit sp4scope:eqversion:11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.30.4

Trust: 0.3

vendor:susemodel:linux enterprise debuginfo sp2scope:eqversion:11

Trust: 0.3

vendor:huaweimodel:ar3200 v200r008c20scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:2.6.34.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.98

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:25.0.1364.1

Trust: 0.3

vendor:mcafeemodel:email gatewayscope:eqversion:7.6.402

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:21.0.1180.13

Trust: 0.3

vendor:googlemodel:chrome osscope:eqversion:26.0.1410.36

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.0.9

Trust: 0.3

vendor:paloaltonetworksmodel:pan-osscope:eqversion:6.1.10

Trust: 0.3

vendor:huaweimodel:cloudengine v100r003c00scope:eqversion:7800

Trust: 0.3

vendor:hpmodel:(comware r3108p03scope:eqversion:51307)

Trust: 0.3

vendor:huaweimodel:cloudengine v200r001sph002scope:neversion:7800

Trust: 0.3

sources: CERT/CC: VU#243144 // BID: 93793 // NVD: CVE-2016-5195

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-5195
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2016-5195
value: HIGH

Trust: 1.0

NVD: CVE-2016-5195
value: MEDIUM

Trust: 0.8

VULMON: CVE-2016-5195
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-5195
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2016-5195
severity: MEDIUM
baseScore: 6.8
vectorString: NONE
accessVector: LOCAL
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.1
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

nvd@nist.gov: CVE-2016-5195
baseSeverity: HIGH
baseScore: 7.0
vectorString: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.0
impactScore: 5.9
version: 3.1

Trust: 2.0

sources: CERT/CC: VU#243144 // VULMON: CVE-2016-5195 // NVD: CVE-2016-5195 // NVD: CVE-2016-5195

PROBLEMTYPE DATA

problemtype:CWE-362

Trust: 1.0

sources: NVD: CVE-2016-5195

THREAT TYPE

local

Trust: 1.0

sources: BID: 93793 // PACKETSTORM: 139316 // PACKETSTORM: 139253 // PACKETSTORM: 139336 // PACKETSTORM: 139334 // PACKETSTORM: 142151 // PACKETSTORM: 139369 // PACKETSTORM: 139438

TYPE

Design Error

Trust: 0.3

sources: BID: 93793

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#243144 // VULMON: CVE-2016-5195

PATCH

title:Red Hat: Important: kernel-rt security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162110 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162124 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162128 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162126 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162106 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162127 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162120 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162132 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162118 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162098 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162105 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162133 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-rt security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162107 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: linux-snapdragon vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3106-4

Trust: 0.1

title:Ubuntu Security Notice: linux-raspi2 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3107-2

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3107-1

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3104-1

Trust: 0.1

title:Ubuntu Security Notice: linux-raspi2 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3106-3

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3105-1

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-trusty vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3105-2

Trust: 0.1

title:Ubuntu Security Notice: linux-ti-omap4 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3104-2

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3106-1

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-xenial vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3106-2

Trust: 0.1

title:Cisco: Cisco TelePresence Video Communication Server Test Validation Script Issueurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20181107-vcsd

Trust: 0.1

title:dirty-cow-toolkiturl:https://github.com/roliboy/rootcow

Trust: 0.1

title: - url:https://github.com/yatt-ze/DirtyCowAndroid

Trust: 0.1

title:polaris-dict-a63-archurl:https://github.com/zaoqi/polaris-dict-a63-arch

Trust: 0.1

sources: VULMON: CVE-2016-5195

EXTERNAL IDS

db:NVDid:CVE-2016-5195

Trust: 3.0

db:CERT/CCid:VU#243144

Trust: 2.1

db:JUNIPERid:JSA10770

Trust: 1.3

db:BIDid:93793

Trust: 1.3

db:PACKETSTORMid:142151

Trust: 1.1

db:JUNIPERid:JSA10807

Trust: 1.0

db:JUNIPERid:JSA10774

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2016/11/03/7

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2016/10/30/1

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/08/15/1

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2016/10/21/1

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2016/10/27/13

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/08/08/1

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/03/07/1

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2016/10/26/7

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/08/08/7

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/08/08/2

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/08/08/8

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2022/08/09/4

Trust: 1.0

db:EXPLOIT-DBid:40611

Trust: 1.0

db:EXPLOIT-DBid:40839

Trust: 1.0

db:EXPLOIT-DBid:40616

Trust: 1.0

db:EXPLOIT-DBid:40847

Trust: 1.0

db:PACKETSTORMid:139923

Trust: 1.0

db:PACKETSTORMid:139287

Trust: 1.0

db:PACKETSTORMid:139922

Trust: 1.0

db:PACKETSTORMid:139277

Trust: 1.0

db:PACKETSTORMid:139286

Trust: 1.0

db:MCAFEEid:SB10177

Trust: 1.0

db:MCAFEEid:SB10222

Trust: 1.0

db:MCAFEEid:SB10176

Trust: 1.0

db:SECTRACKid:1037078

Trust: 1.0

db:VULMONid:CVE-2016-5195

Trust: 0.1

db:PACKETSTORMid:139316

Trust: 0.1

db:PACKETSTORMid:139253

Trust: 0.1

db:PACKETSTORMid:139336

Trust: 0.1

db:PACKETSTORMid:139334

Trust: 0.1

db:PACKETSTORMid:139369

Trust: 0.1

db:PACKETSTORMid:139439

Trust: 0.1

db:PACKETSTORMid:139438

Trust: 0.1

sources: CERT/CC: VU#243144 // VULMON: CVE-2016-5195 // BID: 93793 // PACKETSTORM: 139316 // PACKETSTORM: 139253 // PACKETSTORM: 139336 // PACKETSTORM: 139334 // PACKETSTORM: 142151 // PACKETSTORM: 139369 // PACKETSTORM: 139439 // PACKETSTORM: 139438 // NVD: CVE-2016-5195

REFERENCES

url:https://access.redhat.com/security/cve/cve-2016-5195

Trust: 3.1

url:https://security-tracker.debian.org/tracker/cve-2016-5195

Trust: 2.6

url:https://people.canonical.com/~ubuntu-security/cve/2016/cve-2016-5195.html

Trust: 1.8

url:https://access.redhat.com/security/vulnerabilities/2706661

Trust: 1.5

url:http://rhn.redhat.com/errata/rhsa-2016-2120.html

Trust: 1.4

url:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619

Trust: 1.3

url:https://bugzilla.redhat.com/show_bug.cgi?id=1384344

Trust: 1.3

url:https://source.android.com/security/bulletin/2016-12-01.html

Trust: 1.3

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en

Trust: 1.3

url:https://github.com/dirtycow/dirtycow.github.io/wiki/pocs

Trust: 1.3

url:http://rhn.redhat.com/errata/rhsa-2016-2118.html

Trust: 1.3

url:https://www.kb.cert.org/vuls/id/243144

Trust: 1.3

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-linux

Trust: 1.3

url:https://github.com/dirtycow/dirtycow.github.io/wiki/vulnerabilitydetails

Trust: 1.3

url:https://dirtycow.ninja/

Trust: 1.1

url:https://coreos.com/blog/cve-2016-5195.html

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-3107-1

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-3107-2

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-3106-1

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-3106-2

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2016-2107.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2016-2105.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2016-2128.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2016-2127.html

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-3106-3

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/e7m62srp6czlj4zxcrzkv4wplqbsr7dt/

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html

Trust: 1.0

url:http://packetstormsecurity.com/files/139922/linux-kernel-dirty-cow-ptrace_pokedata-privilege-escalation.html

Trust: 1.0

url:http://seclists.org/fulldisclosure/2024/aug/35

Trust: 1.0

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05341463

Trust: 1.0

url:https://dirtycow.ninja

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03722en_us

Trust: 1.0

url:http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded

Trust: 1.0

url:http://www.securityfocus.com/archive/1/539611/100/0/threaded

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/08/08/1

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c05352241

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2106.html

Trust: 1.0

url:http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03742en_us

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html

Trust: 1.0

url:https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=cve-2016-5195

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html

Trust: 1.0

url:https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html

Trust: 1.0

url:http://www.securityfocus.com/archive/1/540344/100/0/threaded

Trust: 1.0

url:http://fortiguard.com/advisory/fg-ir-16-063

Trust: 1.0

url:https://www.exploit-db.com/exploits/40611/

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2016/10/30/1

Trust: 1.0

url:http://packetstormsecurity.com/files/139286/dirtycow-linux-kernel-race-condition.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3104-1

Trust: 1.0

url:http://www.securityfocus.com/archive/1/540252/100/0/threaded

Trust: 1.0

url:http://packetstormsecurity.com/files/139287/dirtycow-local-root-proof-of-concept.html

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3105-2

Trust: 1.0

url:http://packetstormsecurity.com/files/139277/kernel-live-patch-security-notice-lsn-0012-1.html

Trust: 1.0

url:http://www.kernel.org/pub/linux/kernel/v4.x/changelog-4.8.3

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2132.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2016/10/27/13

Trust: 1.0

url:https://access.redhat.com/errata/rhsa-2017:0372

Trust: 1.0

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10807

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10176

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2124.html

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/08/08/2

Trust: 1.0

url:http://packetstormsecurity.com/files/142151/kernel-live-patch-security-notice-lsn-0021-1.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html

Trust: 1.0

url:https://www.exploit-db.com/exploits/40616/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/nwmdlbwmgzkfhmrj7quqvcerp5qhdb6w/

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03707en_us

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html

Trust: 1.0

url:https://security.paloaltonetworks.com/cve-2016-5195

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/w3aprvdvpdbxlh4dc5ukzvcr742mjim3/

Trust: 1.0

url:https://security.netapp.com/advisory/ntap-20161025-0001/

Trust: 1.0

url:http://www.securityfocus.com/archive/1/540736/100/0/threaded

Trust: 1.0

url:http://www.securityfocus.com/bid/93793

Trust: 1.0

url:https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes

Trust: 1.0

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05352241

Trust: 1.0

url:https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026

Trust: 1.0

url:https://bto.bluecoat.com/security-advisory/sa134

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3105-1

Trust: 1.0

url:https://www.exploit-db.com/exploits/40847/

Trust: 1.0

url:https://source.android.com/security/bulletin/2016-11-01.html

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/03/07/1

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/08/09/4

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/08/08/7

Trust: 1.0

url:http://www.debian.org/security/2016/dsa-3696

Trust: 1.0

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20181107-vcsd

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3104-2

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10222

Trust: 1.0

url:http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2016/10/26/7

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-3106-4

Trust: 1.0

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03761en_us

Trust: 1.0

url:https://www.exploit-db.com/exploits/40839/

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10177

Trust: 1.0

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05347541

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2098.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2133.html

Trust: 1.0

url:http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded

Trust: 1.0

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10774

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2016/10/21/1

Trust: 1.0

url:http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/08/08/8

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2126.html

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2016-2110.html

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2016/11/03/7

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html

Trust: 1.0

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10770

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html

Trust: 1.0

url:http://packetstormsecurity.com/files/139923/linux-kernel-dirty-cow-ptrace_pokedata-privilege-escalation.html

Trust: 1.0

url:https://bugzilla.suse.com/show_bug.cgi?id=1004418

Trust: 1.0

url:http://www.securitytracker.com/id/1037078

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2022/08/15/1

Trust: 1.0

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.8.3

Trust: 0.8

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.7.9

Trust: 0.8

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.4.26

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/362.html

Trust: 0.8

url:https://www.centos.org/forums/viewtopic.php?f=51&t=59782&hilit=cve%202016%205195&start=10

Trust: 0.8

url:https://www.suse.com/security/cve/cve-2016-5195.html

Trust: 0.8

url:https://people.canonical.com/

Trust: 0.8

url:https://www.arista.com/en/support/advisories-notices/security-advisories/1753-field-notice-0026

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-5195

Trust: 0.8

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://access.redhat.com/security/team/key/

Trust: 0.5

url:https://access.redhat.com/articles/11258

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.5

url:https://github.com/amluto/vulnerabilities/blob/master/others/cve-2016-5195/test_cve-2016-5195.c

Trust: 0.3

url:http://www.kernel.org/

Trust: 0.3

url:https://googlechromereleases.blogspot.in/2016/10/stable-channel-update-for-chrome-os_26.html

Trust: 0.3

url:https://kb.vmware.com/selfservice/microsites/search.do?language=en_us&cmd=displaykc&externalid=2147515

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10770&actp=rss

Trust: 0.3

url:https://help.virtuozzo.com/customer/portal/articles/2613795

Trust: 0.3

url:https://help.virtuozzo.com/customer/portal/articles/2613794

Trust: 0.3

url:http://kb.odin.com/en/129683

Trust: 0.3

url:https://github.com/timwr/cve-2016-5195

Trust: 0.3

url:https://forum.proxmox.com/threads/cve-2016-5195-dirty-cow.29908/

Trust: 0.3

url:https://centos.org/forums/viewtopic.php?f=51&p=252514

Trust: 0.3

url:https://www.cloudlinux.com/kernelcare-blog/entry/dirty-cow-vulnerability-the-fix-is-coming

Trust: 0.3

url:https://security-tracker.debian.org/tracker/dla-670-1

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05347541

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05352241

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05341463

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=isg3t1024478

Trust: 0.3

url:https://securityadvisories.paloaltonetworks.com/home/detail/73

Trust: 0.3

url:https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=9691eac5593ff1e2f82391ad327f21d90322aec1

Trust: 0.3

url:https://gryzli.info/2016/10/21/protect-cve-2016-5195-dirtycow-centos-7rhel7cpanelcloudlinux/

Trust: 0.3

url:https://kc.mcafee.com/resources/sites/mcafee/content/live/product_documentation/27000/pd27128/en_us/meg_7_6_406_3402_103_release_notes_en_us.pdf

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21995667

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3104-1/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3105-1/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3105-2/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3106-1/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3106-2/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3106-3/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3106-4/

Trust: 0.3

url:https://www.ubuntu.com/usn/usn-3107-1/

Trust: 0.3

url:https://help.virtuozzo.com/customer/en/portal/articles/2613793

Trust: 0.3

url:http://www.vmware.com/security/advisories/vmsa-2016-0018.html

Trust: 0.3

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.8.0-1017.20

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-lts-xenial/4.4.0-45.66~14.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7039

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-7039

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-8633

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9555

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7912

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7916

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7910

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-8630

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-2583

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-7911

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-8399

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-6074

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9191

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-7308

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9756

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-4470

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4470

Trust: 0.1

sources: CERT/CC: VU#243144 // BID: 93793 // PACKETSTORM: 139316 // PACKETSTORM: 139253 // PACKETSTORM: 139336 // PACKETSTORM: 139334 // PACKETSTORM: 142151 // PACKETSTORM: 139369 // PACKETSTORM: 139439 // PACKETSTORM: 139438 // NVD: CVE-2016-5195

CREDITS

Red Hat

Trust: 0.5

sources: PACKETSTORM: 139336 // PACKETSTORM: 139334 // PACKETSTORM: 139369 // PACKETSTORM: 139439 // PACKETSTORM: 139438

SOURCES

db:CERT/CCid:VU#243144
db:VULMONid:CVE-2016-5195
db:BIDid:93793
db:PACKETSTORMid:139316
db:PACKETSTORMid:139253
db:PACKETSTORMid:139336
db:PACKETSTORMid:139334
db:PACKETSTORMid:142151
db:PACKETSTORMid:139369
db:PACKETSTORMid:139439
db:PACKETSTORMid:139438
db:NVDid:CVE-2016-5195

LAST UPDATE DATE

2026-04-18T20:33:15.423000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#243144date:2016-11-17T00:00:00
db:VULMONid:CVE-2016-5195date:2023-11-07T00:00:00
db:BIDid:93793date:2017-12-19T22:37:00
db:NVDid:CVE-2016-5195date:2025-11-04T16:15:37.070

SOURCES RELEASE DATE

db:CERT/CCid:VU#243144date:2016-10-21T00:00:00
db:VULMONid:CVE-2016-5195date:2016-11-10T00:00:00
db:BIDid:93793date:2016-10-19T00:00:00
db:PACKETSTORMid:139316date:2016-10-24T21:34:33
db:PACKETSTORMid:139253date:2016-10-20T15:37:35
db:PACKETSTORMid:139336date:2016-10-26T14:03:03
db:PACKETSTORMid:139334date:2016-10-26T14:02:52
db:PACKETSTORMid:142151date:2017-04-15T00:38:07
db:PACKETSTORMid:139369date:2016-10-27T22:32:00
db:PACKETSTORMid:139439date:2016-10-31T22:24:00
db:PACKETSTORMid:139438date:2016-10-31T22:23:00
db:NVDid:CVE-2016-5195date:2016-11-10T21:59:00.197