ID CVE-2017-1000407
Summary The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.
References
Vulnerable Configurations
  • Red Hat Linux 6.0
    cpe:2.3:o:redhat:linux:6.0
  • Red Hat Linux 7.0
    cpe:2.3:o:redhat:linux:7.0
  • Linux Kernel 2.6.32
    cpe:2.3:o:linux:linux_kernel:2.6.32
  • Linux Kernel 2.6.32 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.32:rc1
  • Linux Kernel 2.6.32 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.32:rc3
  • Linux Kernel 2.6.32 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.32:rc4
  • Linux Kernel 2.6.32 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.32:rc5
  • Linux Kernel 2.6.32 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.32:rc6
  • Linux Kernel 2.6.32 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.32:rc7
  • Linux Kernel 2.6.32 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:2.6.32:rc8
  • Linux Kernel 2.6.32.1
    cpe:2.3:o:linux:linux_kernel:2.6.32.1
  • Linux Kernel 2.6.32.2
    cpe:2.3:o:linux:linux_kernel:2.6.32.2
  • Linux Kernel 2.6.32.3
    cpe:2.3:o:linux:linux_kernel:2.6.32.3
  • Linux Kernel 2.6.32.4
    cpe:2.3:o:linux:linux_kernel:2.6.32.4
  • Linux Kernel 2.6.32.5
    cpe:2.3:o:linux:linux_kernel:2.6.32.5
  • Linux Kernel 2.6.32.6
    cpe:2.3:o:linux:linux_kernel:2.6.32.6
  • Linux Kernel 2.6.32.7
    cpe:2.3:o:linux:linux_kernel:2.6.32.7
  • Linux Kernel 2.6.32.8
    cpe:2.3:o:linux:linux_kernel:2.6.32.8
  • Linux Kernel 2.6.32.9
    cpe:2.3:o:linux:linux_kernel:2.6.32.9
  • Linux Kernel 2.6.32.10
    cpe:2.3:o:linux:linux_kernel:2.6.32.10
  • Linux Kernel 2.6.32.11
    cpe:2.3:o:linux:linux_kernel:2.6.32.11
  • Linux Kernel 2.6.32.12
    cpe:2.3:o:linux:linux_kernel:2.6.32.12
  • Linux Kernel 2.6.32.13
    cpe:2.3:o:linux:linux_kernel:2.6.32.13
  • Linux Kernel 2.6.32.14
    cpe:2.3:o:linux:linux_kernel:2.6.32.14
  • Linux Kernel 2.6.32.15
    cpe:2.3:o:linux:linux_kernel:2.6.32.15
  • Linux Kernel 2.6.32.16
    cpe:2.3:o:linux:linux_kernel:2.6.32.16
  • Linux Kernel 2.6.32.17
    cpe:2.3:o:linux:linux_kernel:2.6.32.17
  • Linux Kernel 2.6.32.18
    cpe:2.3:o:linux:linux_kernel:2.6.32.18
  • Linux Kernel 2.6.32.19
    cpe:2.3:o:linux:linux_kernel:2.6.32.19
  • Linux Kernel 2.6.32.20
    cpe:2.3:o:linux:linux_kernel:2.6.32.20
  • Linux Kernel 2.6.32.21
    cpe:2.3:o:linux:linux_kernel:2.6.32.21
  • Linux Kernel 2.6.32.22
    cpe:2.3:o:linux:linux_kernel:2.6.32.22
  • Linux Kernel 2.6.32.23
    cpe:2.3:o:linux:linux_kernel:2.6.32.23
  • Linux Kernel 2.6.32.24
    cpe:2.3:o:linux:linux_kernel:2.6.32.24
  • Linux Kernel 2.6.32.25
    cpe:2.3:o:linux:linux_kernel:2.6.32.25
  • Linux Kernel 2.6.32.26
    cpe:2.3:o:linux:linux_kernel:2.6.32.26
  • Linux Kernel 2.6.32.27
    cpe:2.3:o:linux:linux_kernel:2.6.32.27
  • Linux Kernel 2.6.32.28
    cpe:2.3:o:linux:linux_kernel:2.6.32.28
  • Linux Kernel 2.6.32.29
    cpe:2.3:o:linux:linux_kernel:2.6.32.29
  • Linux Kernel 2.6.32.30
    cpe:2.3:o:linux:linux_kernel:2.6.32.30
  • Linux Kernel 2.6.32.31
    cpe:2.3:o:linux:linux_kernel:2.6.32.31
  • Linux Kernel 2.6.32.32
    cpe:2.3:o:linux:linux_kernel:2.6.32.32
  • Linux Kernel 2.6.32.33
    cpe:2.3:o:linux:linux_kernel:2.6.32.33
  • Linux Kernel 2.6.32.34
    cpe:2.3:o:linux:linux_kernel:2.6.32.34
  • Linux Kernel 2.6.32.35
    cpe:2.3:o:linux:linux_kernel:2.6.32.35
  • Linux Kernel 2.6.32.36
    cpe:2.3:o:linux:linux_kernel:2.6.32.36
  • Linux Kernel 2.6.32.37
    cpe:2.3:o:linux:linux_kernel:2.6.32.37
  • Linux Kernel 2.6.32.38
    cpe:2.3:o:linux:linux_kernel:2.6.32.38
  • Linux Kernel 2.6.32.39
    cpe:2.3:o:linux:linux_kernel:2.6.32.39
  • Linux Kernel 2.6.32.40
    cpe:2.3:o:linux:linux_kernel:2.6.32.40
  • Linux Kernel 2.6.32.41
    cpe:2.3:o:linux:linux_kernel:2.6.32.41
  • Linux Kernel 2.6.32.42
    cpe:2.3:o:linux:linux_kernel:2.6.32.42
  • Linux Kernel 2.6.32.43
    cpe:2.3:o:linux:linux_kernel:2.6.32.43
  • Linux Kernel 2.6.32.44
    cpe:2.3:o:linux:linux_kernel:2.6.32.44
  • Linux Kernel 2.6.32.45
    cpe:2.3:o:linux:linux_kernel:2.6.32.45
  • Linux Kernel 2.6.32.46
    cpe:2.3:o:linux:linux_kernel:2.6.32.46
  • Linux Kernel 2.6.32.47
    cpe:2.3:o:linux:linux_kernel:2.6.32.47
  • Linux Kernel 2.6.32.48
    cpe:2.3:o:linux:linux_kernel:2.6.32.48
  • Linux Kernel 2.6.32.49
    cpe:2.3:o:linux:linux_kernel:2.6.32.49
  • Linux Kernel 2.6.32.50
    cpe:2.3:o:linux:linux_kernel:2.6.32.50
  • Linux Kernel 2.6.32.51
    cpe:2.3:o:linux:linux_kernel:2.6.32.51
  • Linux Kernel 2.6.32.52
    cpe:2.3:o:linux:linux_kernel:2.6.32.52
  • Linux Kernel 2.6.32.53
    cpe:2.3:o:linux:linux_kernel:2.6.32.53
  • Linux Kernel 2.6.32.54
    cpe:2.3:o:linux:linux_kernel:2.6.32.54
  • Linux Kernel 2.6.32.55
    cpe:2.3:o:linux:linux_kernel:2.6.32.55
  • Linux Kernel 2.6.32.56
    cpe:2.3:o:linux:linux_kernel:2.6.32.56
  • Linux Kernel 2.6.32.57
    cpe:2.3:o:linux:linux_kernel:2.6.32.57
  • Linux Kernel 2.6.32.58
    cpe:2.3:o:linux:linux_kernel:2.6.32.58
  • Linux Kernel 2.6.33
    cpe:2.3:o:linux:linux_kernel:2.6.33
  • Linux Kernel 2.6.33 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.33:rc1
  • Linux Kernel 2.6.33 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.33:rc2
  • Linux Kernel 2.6.33 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.33:rc3
  • Linux Kernel 2.6.33 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.33:rc4
  • Linux Kernel 2.6.33 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.33:rc5
  • Linux Kernel 2.6.33 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.33:rc6
  • Linux Kernel 2.6.33 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.33:rc7
  • Linux Kernel 2.6.33 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:2.6.33:rc8
  • Linux Kernel 2.6.33.1
    cpe:2.3:o:linux:linux_kernel:2.6.33.1
  • Linux Kernel 2.6.33.2
    cpe:2.3:o:linux:linux_kernel:2.6.33.2
  • Linux Kernel 2.6.33.3
    cpe:2.3:o:linux:linux_kernel:2.6.33.3
  • Linux Kernel 2.6.33.4
    cpe:2.3:o:linux:linux_kernel:2.6.33.4
  • Linux Kernel 2.6.33.5
    cpe:2.3:o:linux:linux_kernel:2.6.33.5
  • Linux Kernel 2.6.33.6
    cpe:2.3:o:linux:linux_kernel:2.6.33.6
  • Linux Kernel 2.6.33.7
    cpe:2.3:o:linux:linux_kernel:2.6.33.7
  • Linux Kernel 2.6.33.8
    cpe:2.3:o:linux:linux_kernel:2.6.33.8
  • Linux Kernel 2.6.33.9
    cpe:2.3:o:linux:linux_kernel:2.6.33.9
  • Linux Kernel 2.6.33.10
    cpe:2.3:o:linux:linux_kernel:2.6.33.10
  • Linux Kernel 2.6.33.11
    cpe:2.3:o:linux:linux_kernel:2.6.33.11
  • Linux Kernel 2.6.33.12
    cpe:2.3:o:linux:linux_kernel:2.6.33.12
  • Linux Kernel 2.6.33.13
    cpe:2.3:o:linux:linux_kernel:2.6.33.13
  • Linux Kernel 2.6.33.14
    cpe:2.3:o:linux:linux_kernel:2.6.33.14
  • Linux Kernel 2.6.33.15
    cpe:2.3:o:linux:linux_kernel:2.6.33.15
  • Linux Kernel 2.6.33.16
    cpe:2.3:o:linux:linux_kernel:2.6.33.16
  • Linux Kernel 2.6.33.17
    cpe:2.3:o:linux:linux_kernel:2.6.33.17
  • Linux Kernel 2.6.33.18
    cpe:2.3:o:linux:linux_kernel:2.6.33.18
  • Linux Kernel 2.6.33.19
    cpe:2.3:o:linux:linux_kernel:2.6.33.19
  • Linux Kernel 2.6.33.20
    cpe:2.3:o:linux:linux_kernel:2.6.33.20
  • Linux Kernel 2.6.34
    cpe:2.3:o:linux:linux_kernel:2.6.34
  • Linux Kernel 2.6.34 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.34:rc1
  • Linux Kernel 2.6.34 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.34:rc2
  • Linux Kernel 2.6.34 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.34:rc3
  • Linux Kernel 2.6.34 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.34:rc4
  • Linux Kernel 2.6.34 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.34:rc5
  • Linux Kernel 2.6.34 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.34:rc6
  • Linux Kernel 2.6.34 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.34:rc7
  • Linux Kernel 2.6.34.1
    cpe:2.3:o:linux:linux_kernel:2.6.34.1
  • Linux Kernel 2.6.34.2
    cpe:2.3:o:linux:linux_kernel:2.6.34.2
  • Linux Kernel 2.6.34.3
    cpe:2.3:o:linux:linux_kernel:2.6.34.3
  • Linux Kernel 2.6.34.4
    cpe:2.3:o:linux:linux_kernel:2.6.34.4
  • Linux Kernel 2.6.34.5
    cpe:2.3:o:linux:linux_kernel:2.6.34.5
  • Linux Kernel 2.6.34.6
    cpe:2.3:o:linux:linux_kernel:2.6.34.6
  • Linux Kernel 2.6.34.7
    cpe:2.3:o:linux:linux_kernel:2.6.34.7
  • Linux Kernel 2.6.34.8
    cpe:2.3:o:linux:linux_kernel:2.6.34.8
  • Linux Kernel 2.6.34.9
    cpe:2.3:o:linux:linux_kernel:2.6.34.9
  • Linux Kernel 2.6.34.10
    cpe:2.3:o:linux:linux_kernel:2.6.34.10
  • Linux Kernel 2.6.35
    cpe:2.3:o:linux:linux_kernel:2.6.35
  • Linux Kernel 2.6.35 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.35:rc1
  • Linux Kernel 2.6.35 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.35:rc2
  • Linux Kernel 2.6.35 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.35:rc3
  • Linux Kernel 2.6.35 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.35:rc4
  • Linux Kernel 2.6.35 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.35:rc5
  • Linux Kernel 2.6.35 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.35:rc6
  • Linux Kernel 2.6.35.1
    cpe:2.3:o:linux:linux_kernel:2.6.35.1
  • Linux Kernel 2.6.35.2
    cpe:2.3:o:linux:linux_kernel:2.6.35.2
  • Linux Kernel 2.6.35.3
    cpe:2.3:o:linux:linux_kernel:2.6.35.3
  • Linux Kernel 2.6.35.4
    cpe:2.3:o:linux:linux_kernel:2.6.35.4
  • Linux Kernel 2.6.35.5
    cpe:2.3:o:linux:linux_kernel:2.6.35.5
  • Linux Kernel 2.6.35.6
    cpe:2.3:o:linux:linux_kernel:2.6.35.6
  • Linux Kernel 2.6.35.7
    cpe:2.3:o:linux:linux_kernel:2.6.35.7
  • Linux Kernel 2.6.35.8
    cpe:2.3:o:linux:linux_kernel:2.6.35.8
  • Linux Kernel 2.6.35.9
    cpe:2.3:o:linux:linux_kernel:2.6.35.9
  • Linux Kernel 2.6.35.10
    cpe:2.3:o:linux:linux_kernel:2.6.35.10
  • Linux Kernel 2.6.35.11
    cpe:2.3:o:linux:linux_kernel:2.6.35.11
  • Linux Kernel 2.6.35.12
    cpe:2.3:o:linux:linux_kernel:2.6.35.12
  • Linux Kernel 2.6.35.13
    cpe:2.3:o:linux:linux_kernel:2.6.35.13
  • Linux Kernel 2.6.36
    cpe:2.3:o:linux:linux_kernel:2.6.36
  • Linux Kernel 2.6.36 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.36:rc1
  • Linux Kernel 2.6.36 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.36:rc2
  • Linux Kernel 2.6.36 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.36:rc3
  • Linux Kernel 2.6.36 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.36:rc4
  • Linux Kernel 2.6.36 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.36:rc5
  • Linux Kernel 2.6.36 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.36:rc6
  • Linux Kernel 2.6.36 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.36:rc7
  • Linux Kernel 2.6.36 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:2.6.36:rc8
  • Linux Kernel 2.6.36.1
    cpe:2.3:o:linux:linux_kernel:2.6.36.1
  • Linux Kernel 2.6.36.2
    cpe:2.3:o:linux:linux_kernel:2.6.36.2
  • Linux Kernel 2.6.36.3
    cpe:2.3:o:linux:linux_kernel:2.6.36.3
  • Linux Kernel 2.6.36.4
    cpe:2.3:o:linux:linux_kernel:2.6.36.4
  • Linux Kernel 2.6.37
    cpe:2.3:o:linux:linux_kernel:2.6.37
  • Linux Kernel 2.6.37 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.37:rc1
  • Linux Kernel 2.6.37 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.37:rc2
  • Linux Kernel 2.6.37 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.37:rc3
  • Linux Kernel 2.6.37 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.37:rc4
  • Linux Kernel 2.6.37 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.37:rc5
  • Linux Kernel 2.6.37 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.37:rc6
  • Linux Kernel 2.6.37 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.37:rc7
  • Linux Kernel 2.6.37 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:2.6.37:rc8
  • Linux Kernel 2.6.37.1
    cpe:2.3:o:linux:linux_kernel:2.6.37.1
  • Linux Kernel 2.6.37.2
    cpe:2.3:o:linux:linux_kernel:2.6.37.2
  • Linux Kernel 2.6.37.3
    cpe:2.3:o:linux:linux_kernel:2.6.37.3
  • Linux Kernel 2.6.37.4
    cpe:2.3:o:linux:linux_kernel:2.6.37.4
  • Linux Kernel 2.6.37.5
    cpe:2.3:o:linux:linux_kernel:2.6.37.5
  • Linux Kernel 2.6.37.6
    cpe:2.3:o:linux:linux_kernel:2.6.37.6
  • Linux Kernel 2.6.38
    cpe:2.3:o:linux:linux_kernel:2.6.38
  • Linux Kernel 2.6.38 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.38:rc1
  • Linux Kernel 2.6.38 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.38:rc2
  • Linux Kernel 2.6.38 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.38:rc3
  • Linux Kernel 2.6.38 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.38:rc4
  • Linux Kernel 2.6.38 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.38:rc5
  • Linux Kernel 2.6.38 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.38:rc6
  • Linux Kernel 2.6.38 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.38:rc7
  • Linux Kernel 2.6.38 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:2.6.38:rc8
  • Linux Kernel 2.6.38.1
    cpe:2.3:o:linux:linux_kernel:2.6.38.1
  • Linux Kernel 2.6.38.2
    cpe:2.3:o:linux:linux_kernel:2.6.38.2
  • Linux Kernel 2.6.38.3
    cpe:2.3:o:linux:linux_kernel:2.6.38.3
  • Linux Kernel 2.6.38.4
    cpe:2.3:o:linux:linux_kernel:2.6.38.4
  • Linux Kernel 2.6.38.5
    cpe:2.3:o:linux:linux_kernel:2.6.38.5
  • Linux Kernel 2.6.38.6
    cpe:2.3:o:linux:linux_kernel:2.6.38.6
  • Linux Kernel 2.6.38.7
    cpe:2.3:o:linux:linux_kernel:2.6.38.7
  • Linux Kernel 2.6.38.8
    cpe:2.3:o:linux:linux_kernel:2.6.38.8
  • Linux Kernel 2.6.39
    cpe:2.3:o:linux:linux_kernel:2.6.39
  • Linux Kernel 2.6.39 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.39:rc1
  • Linux Kernel 2.6.39 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.39:rc2
  • Linux Kernel 2.6.39 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.39:rc3
  • Linux Kernel 2.6.39 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.39:rc4
  • Linux Kernel 2.6.39 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.39:rc5
  • Linux Kernel 2.6.39 release candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.39:rc6
  • Linux Kernel 2.6.39 release candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.39:rc7
  • Linux Kernel 2.6.39.1
    cpe:2.3:o:linux:linux_kernel:2.6.39.1
  • Linux Kernel 2.6.39.2
    cpe:2.3:o:linux:linux_kernel:2.6.39.2
  • Linux Kernel 2.6.39.3
    cpe:2.3:o:linux:linux_kernel:2.6.39.3
  • Linux Kernel 2.6.39.4
    cpe:2.3:o:linux:linux_kernel:2.6.39.4
  • Linux Kernel 3.0
    cpe:2.3:o:linux:linux_kernel:3.0
  • Linux Kernel 3.0 release candidate 1
    cpe:2.3:o:linux:linux_kernel:3.0:rc1
  • Linux Kernel 3.0 release candidate 2
    cpe:2.3:o:linux:linux_kernel:3.0:rc2
  • Linux Kernel 3.0 release candidate 3
    cpe:2.3:o:linux:linux_kernel:3.0:rc3
  • Linux Kernel 3.0 release candidate 4
    cpe:2.3:o:linux:linux_kernel:3.0:rc4
  • Linux Kernel 3.0 release candidate 5
    cpe:2.3:o:linux:linux_kernel:3.0:rc5
  • Linux Kernel 3.0 release candidate 6
    cpe:2.3:o:linux:linux_kernel:3.0:rc6
  • Linux Kernel 3.0 release candidate 7
    cpe:2.3:o:linux:linux_kernel:3.0:rc7
  • Linux Kernel 3.0.1
    cpe:2.3:o:linux:linux_kernel:3.0.1
  • Linux Kernel 3.0.2
    cpe:2.3:o:linux:linux_kernel:3.0.2
  • Linux Kernel 3.0.3
    cpe:2.3:o:linux:linux_kernel:3.0.3
  • Linux Kernel 3.0.4
    cpe:2.3:o:linux:linux_kernel:3.0.4
  • Linux Kernel 3.0.5
    cpe:2.3:o:linux:linux_kernel:3.0.5
  • Linux Kernel 3.0.6
    cpe:2.3:o:linux:linux_kernel:3.0.6
  • Linux Kernel 3.0.7
    cpe:2.3:o:linux:linux_kernel:3.0.7
  • Linux Kernel 3.0.8
    cpe:2.3:o:linux:linux_kernel:3.0.8
  • Linux Kernel 3.0.9
    cpe:2.3:o:linux:linux_kernel:3.0.9
  • Linux Kernel 3.0.10
    cpe:2.3:o:linux:linux_kernel:3.0.10
  • Linux Kernel 3.0.11
    cpe:2.3:o:linux:linux_kernel:3.0.11
  • Linux Kernel 3.0.12
    cpe:2.3:o:linux:linux_kernel:3.0.12
  • Linux Kernel 3.0.13
    cpe:2.3:o:linux:linux_kernel:3.0.13
  • Linux Kernel 3.0.14
    cpe:2.3:o:linux:linux_kernel:3.0.14
  • Linux Kernel 3.0.15
    cpe:2.3:o:linux:linux_kernel:3.0.15
  • Linux Kernel 3.0.16
    cpe:2.3:o:linux:linux_kernel:3.0.16
  • Linux Kernel 3.0.17
    cpe:2.3:o:linux:linux_kernel:3.0.17
  • Linux Kernel 3.0.18
    cpe:2.3:o:linux:linux_kernel:3.0.18
  • Linux Kernel 3.0.19
    cpe:2.3:o:linux:linux_kernel:3.0.19
  • Linux Kernel 3.0.20
    cpe:2.3:o:linux:linux_kernel:3.0.20
  • Linux Kernel 3.0.21
    cpe:2.3:o:linux:linux_kernel:3.0.21
  • Linux Kernel 3.0.22
    cpe:2.3:o:linux:linux_kernel:3.0.22
  • Linux Kernel 3.0.23
    cpe:2.3:o:linux:linux_kernel:3.0.23
  • Linux Kernel 3.0.24
    cpe:2.3:o:linux:linux_kernel:3.0.24
  • Linux Kernel 3.0.25
    cpe:2.3:o:linux:linux_kernel:3.0.25
  • Linux Kernel 3.0.26
    cpe:2.3:o:linux:linux_kernel:3.0.26
  • Linux Kernel 3.0.27
    cpe:2.3:o:linux:linux_kernel:3.0.27
  • Linux Kernel 3.0.28
    cpe:2.3:o:linux:linux_kernel:3.0.28
  • Linux Kernel 3.0.29
    cpe:2.3:o:linux:linux_kernel:3.0.29
  • Linux Kernel 3.0.30
    cpe:2.3:o:linux:linux_kernel:3.0.30
  • Linux Kernel 3.0.31
    cpe:2.3:o:linux:linux_kernel:3.0.31
  • Linux Kernel 3.0.32
    cpe:2.3:o:linux:linux_kernel:3.0.32
  • Linux Kernel 3.0.33
    cpe:2.3:o:linux:linux_kernel:3.0.33
  • Linux Kernel 3.0.34
    cpe:2.3:o:linux:linux_kernel:3.0.34
  • Linux Kernel 3.0.35
    cpe:2.3:o:linux:linux_kernel:3.0.35
  • Linux Kernel 3.0.36
    cpe:2.3:o:linux:linux_kernel:3.0.36
  • Linux Kernel 3.0.37
    cpe:2.3:o:linux:linux_kernel:3.0.37
  • Linux Kernel 3.0.38
    cpe:2.3:o:linux:linux_kernel:3.0.38
  • Linux Kernel 3.0.39
    cpe:2.3:o:linux:linux_kernel:3.0.39
  • Linux Kernel 3.0.40
    cpe:2.3:o:linux:linux_kernel:3.0.40
  • Linux Kernel 3.0.41
    cpe:2.3:o:linux:linux_kernel:3.0.41
  • Linux Kernel 3.0.42
    cpe:2.3:o:linux:linux_kernel:3.0.42
  • Linux Kernel 3.0.43
    cpe:2.3:o:linux:linux_kernel:3.0.43
  • Linux Kernel 3.0.44
    cpe:2.3:o:linux:linux_kernel:3.0.44
  • Linux Kernel 3.0.45
    cpe:2.3:o:linux:linux_kernel:3.0.45
  • Linux Kernel 3.0.46
    cpe:2.3:o:linux:linux_kernel:3.0.46
  • Linux Kernel 3.0.47
    cpe:2.3:o:linux:linux_kernel:3.0.47
  • Linux Kernel 3.0.48
    cpe:2.3:o:linux:linux_kernel:3.0.48
  • Linux Kernel 3.0.49
    cpe:2.3:o:linux:linux_kernel:3.0.49
  • Linux Kernel 3.0.50
    cpe:2.3:o:linux:linux_kernel:3.0.50
  • Linux Kernel 3.0.51
    cpe:2.3:o:linux:linux_kernel:3.0.51
  • Linux Kernel 3.0.52
    cpe:2.3:o:linux:linux_kernel:3.0.52
  • Linux Kernel 3.0.53
    cpe:2.3:o:linux:linux_kernel:3.0.53
  • Linux Kernel 3.0.54
    cpe:2.3:o:linux:linux_kernel:3.0.54
  • Linux Kernel 3.0.55
    cpe:2.3:o:linux:linux_kernel:3.0.55
  • Linux Kernel 3.0.56
    cpe:2.3:o:linux:linux_kernel:3.0.56
  • Linux Kernel 3.0.57
    cpe:2.3:o:linux:linux_kernel:3.0.57
  • Linux Kernel 3.0.58
    cpe:2.3:o:linux:linux_kernel:3.0.58
  • Linux Kernel 3.0.59
    cpe:2.3:o:linux:linux_kernel:3.0.59
  • Linux Kernel 3.0.60
    cpe:2.3:o:linux:linux_kernel:3.0.60
  • Linux Kernel 3.0.61
    cpe:2.3:o:linux:linux_kernel:3.0.61
  • Linux Kernel 3.0.62
    cpe:2.3:o:linux:linux_kernel:3.0.62
  • Linux Kernel 3.0.63
    cpe:2.3:o:linux:linux_kernel:3.0.63
  • Linux Kernel 3.0.64
    cpe:2.3:o:linux:linux_kernel:3.0.64
  • Linux Kernel 3.0.65
    cpe:2.3:o:linux:linux_kernel:3.0.65
  • Linux Kernel 3.0.66
    cpe:2.3:o:linux:linux_kernel:3.0.66
  • Linux Kernel 3.0.67
    cpe:2.3:o:linux:linux_kernel:3.0.67
  • Linux Kernel 3.0.68
    cpe:2.3:o:linux:linux_kernel:3.0.68
  • Linux Kernel 3.0.69
    cpe:2.3:o:linux:linux_kernel:3.0.69
  • Linux Kernel 3.0.70
    cpe:2.3:o:linux:linux_kernel:3.0.70
  • Linux Kernel 3.0.71
    cpe:2.3:o:linux:linux_kernel:3.0.71
  • Linux Kernel 3.0.72
    cpe:2.3:o:linux:linux_kernel:3.0.72
  • Linux Kernel 3.0.73
    cpe:2.3:o:linux:linux_kernel:3.0.73
  • Linux Kernel 3.0.74
    cpe:2.3:o:linux:linux_kernel:3.0.74
  • Linux Kernel 3.0.75
    cpe:2.3:o:linux:linux_kernel:3.0.75
  • Linux Kernel 3.0.76
    cpe:2.3:o:linux:linux_kernel:3.0.76
  • Linux Kernel 3.0.77
    cpe:2.3:o:linux:linux_kernel:3.0.77
  • Linux Kernel 3.0.78
    cpe:2.3:o:linux:linux_kernel:3.0.78
  • Linux Kernel 3.0.79
    cpe:2.3:o:linux:linux_kernel:3.0.79
  • Linux Kernel 3.0.80
    cpe:2.3:o:linux:linux_kernel:3.0.80
  • Linux Kernel 3.0.81
    cpe:2.3:o:linux:linux_kernel:3.0.81
  • Linux Kernel 3.0.82
    cpe:2.3:o:linux:linux_kernel:3.0.82
  • Linux Kernel 3.0.83
    cpe:2.3:o:linux:linux_kernel:3.0.83
  • Linux Kernel 3.0.84
    cpe:2.3:o:linux:linux_kernel:3.0.84
  • Linux Kernel 3.0.85
    cpe:2.3:o:linux:linux_kernel:3.0.85
  • Linux Kernel 3.0.86
    cpe:2.3:o:linux:linux_kernel:3.0.86
  • Linux Kernel 3.0.87
    cpe:2.3:o:linux:linux_kernel:3.0.87
  • Linux Kernel 3.0.88
    cpe:2.3:o:linux:linux_kernel:3.0.88
  • Linux Kernel 3.0.89
    cpe:2.3:o:linux:linux_kernel:3.0.89
  • Linux Kernel 3.0.90
    cpe:2.3:o:linux:linux_kernel:3.0.90
  • Linux Kernel 3.0.91
    cpe:2.3:o:linux:linux_kernel:3.0.91
  • Linux Kernel 3.0.92
    cpe:2.3:o:linux:linux_kernel:3.0.92
  • Linux Kernel 3.0.93
    cpe:2.3:o:linux:linux_kernel:3.0.93
  • Linux Kernel 3.0.94
    cpe:2.3:o:linux:linux_kernel:3.0.94
  • Linux Kernel 3.0.95
    cpe:2.3:o:linux:linux_kernel:3.0.95
  • Linux Kernel 3.0.96
    cpe:2.3:o:linux:linux_kernel:3.0.96
  • Linux Kernel 3.0.97
    cpe:2.3:o:linux:linux_kernel:3.0.97
  • Linux Kernel 3.0.98
    cpe:2.3:o:linux:linux_kernel:3.0.98
  • Linux Kernel 3.0.99
    cpe:2.3:o:linux:linux_kernel:3.0.99
  • Linux Kernel 3.0.100
    cpe:2.3:o:linux:linux_kernel:3.0.100
  • Linux Kernel 3.0.101
    cpe:2.3:o:linux:linux_kernel:3.0.101
  • Linux Kernel 3.1
    cpe:2.3:o:linux:linux_kernel:3.1
  • Linux Kernel 3.1 release candidate 1
    cpe:2.3:o:linux:linux_kernel:3.1:rc1
  • Linux Kernel 3.1 release candidate 2
    cpe:2.3:o:linux:linux_kernel:3.1:rc2
  • Linux Kernel 3.1 release candidate 3
    cpe:2.3:o:linux:linux_kernel:3.1:rc3
  • Linux Kernel 3.1 release candidate 4
    cpe:2.3:o:linux:linux_kernel:3.1:rc4
  • Linux Kernel 3.1.1
    cpe:2.3:o:linux:linux_kernel:3.1.1
  • Linux Kernel 3.1.2
    cpe:2.3:o:linux:linux_kernel:3.1.2
  • Linux Kernel 3.1.3
    cpe:2.3:o:linux:linux_kernel:3.1.3
  • Linux Kernel 3.1.4
    cpe:2.3:o:linux:linux_kernel:3.1.4
  • Linux Kernel 3.1.5
    cpe:2.3:o:linux:linux_kernel:3.1.5
  • Linux Kernel 3.1.6
    cpe:2.3:o:linux:linux_kernel:3.1.6
  • Linux Kernel 3.1.7
    cpe:2.3:o:linux:linux_kernel:3.1.7
  • Linux Kernel 3.1.8
    cpe:2.3:o:linux:linux_kernel:3.1.8
  • Linux Kernel 3.1.9
    cpe:2.3:o:linux:linux_kernel:3.1.9
  • Linux Kernel 3.1.10
    cpe:2.3:o:linux:linux_kernel:3.1.10
  • Linux Kernel 3.2
    cpe:2.3:o:linux:linux_kernel:3.2
  • Linux Kernel 3.2 (x86)
    cpe:2.3:o:linux:linux_kernel:3.2:-:-:-:-:-:x86
  • Linux Kernel 3.2 release candidate 2
    cpe:2.3:o:linux:linux_kernel:3.2:rc2
  • Linux Kernel 3.2 release candidate 3
    cpe:2.3:o:linux:linux_kernel:3.2:rc3
  • Linux Kernel 3.2 release candidate 4
    cpe:2.3:o:linux:linux_kernel:3.2:rc4
  • Linux Kernel 3.2 release candidate 5
    cpe:2.3:o:linux:linux_kernel:3.2:rc5
  • Linux Kernel 3.2 release candidate 6
    cpe:2.3:o:linux:linux_kernel:3.2:rc6
  • Linux Kernel 3.2 release candidate 7
    cpe:2.3:o:linux:linux_kernel:3.2:rc7
  • Linux Kernel 3.2.1
    cpe:2.3:o:linux:linux_kernel:3.2.1
  • Linux Kernel 3.2.1 (x86)
    cpe:2.3:o:linux:linux_kernel:3.2.1:-:-:-:-:-:x86
  • Linux Kernel 3.2.2
    cpe:2.3:o:linux:linux_kernel:3.2.2
  • Linux Kernel 3.2.3
    cpe:2.3:o:linux:linux_kernel:3.2.3
  • Linux Kernel 3.2.4
    cpe:2.3:o:linux:linux_kernel:3.2.4
  • Linux Kernel 3.2.5
    cpe:2.3:o:linux:linux_kernel:3.2.5
  • Linux Kernel 3.2.6
    cpe:2.3:o:linux:linux_kernel:3.2.6
  • Linux Kernel 3.2.7
    cpe:2.3:o:linux:linux_kernel:3.2.7
  • Linux Kernel 3.2.8
    cpe:2.3:o:linux:linux_kernel:3.2.8
  • Linux Kernel 3.2.9
    cpe:2.3:o:linux:linux_kernel:3.2.9
  • Linux Kernel 3.2.10
    cpe:2.3:o:linux:linux_kernel:3.2.10
  • Linux Kernel 3.2.11
    cpe:2.3:o:linux:linux_kernel:3.2.11
  • Linux Kernel 3.2.12
    cpe:2.3:o:linux:linux_kernel:3.2.12
  • Linux Kernel 3.2.13
    cpe:2.3:o:linux:linux_kernel:3.2.13
  • Linux Kernel 3.2.14
    cpe:2.3:o:linux:linux_kernel:3.2.14
  • Linux Kernel 3.2.15
    cpe:2.3:o:linux:linux_kernel:3.2.15
  • Linux Kernel 3.2.16
    cpe:2.3:o:linux:linux_kernel:3.2.16
  • Linux Kernel 3.2.17
    cpe:2.3:o:linux:linux_kernel:3.2.17
  • Linux Kernel 3.2.18
    cpe:2.3:o:linux:linux_kernel:3.2.18
  • Linux Kernel 3.2.19
    cpe:2.3:o:linux:linux_kernel:3.2.19
  • Linux Kernel 3.2.20
    cpe:2.3:o:linux:linux_kernel:3.2.20
  • Linux Kernel 3.2.21
    cpe:2.3:o:linux:linux_kernel:3.2.21
  • Linux Kernel 3.2.22
    cpe:2.3:o:linux:linux_kernel:3.2.22
  • Linux Kernel 3.2.23
    cpe:2.3:o:linux:linux_kernel:3.2.23
  • Linux Kernel 3.2.24
    cpe:2.3:o:linux:linux_kernel:3.2.24
  • Linux Kernel 3.2.25
    cpe:2.3:o:linux:linux_kernel:3.2.25
  • Linux Kernel 3.2.26
    cpe:2.3:o:linux:linux_kernel:3.2.26
  • Linux Kernel 3.2.27
    cpe:2.3:o:linux:linux_kernel:3.2.27
  • Linux Kernel 3.2.28
    cpe:2.3:o:linux:linux_kernel:3.2.28
  • Linux Kernel 3.2.29
    cpe:2.3:o:linux:linux_kernel:3.2.29
  • Linux Kernel 3.2.30
    cpe:2.3:o:linux:linux_kernel:3.2.30
  • Linux Kernel 3.2.64
    cpe:2.3:o:linux:linux_kernel:3.2.64
  • Linux Kernel 3.2.65
    cpe:2.3:o:linux:linux_kernel:3.2.65
  • Linux Kernel 3.2.66
    cpe:2.3:o:linux:linux_kernel:3.2.66
  • Linux Kernel 3.2.67
    cpe:2.3:o:linux:linux_kernel:3.2.67
  • Linux Kernel 3.2.68
    cpe:2.3:o:linux:linux_kernel:3.2.68
  • Linux Kernel 3.2.69
    cpe:2.3:o:linux:linux_kernel:3.2.69
  • Linux Kernel 3.2.70
    cpe:2.3:o:linux:linux_kernel:3.2.70
  • Linux Kernel 3.2.71
    cpe:2.3:o:linux:linux_kernel:3.2.71
  • Linux Kernel 3.2.72
    cpe:2.3:o:linux:linux_kernel:3.2.72
  • Linux Kernel 3.2.73
    cpe:2.3:o:linux:linux_kernel:3.2.73
  • Linux Kernel 3.2.74
    cpe:2.3:o:linux:linux_kernel:3.2.74
  • Linux Kernel 3.2.75
    cpe:2.3:o:linux:linux_kernel:3.2.75
  • Linux Kernel 3.2.76
    cpe:2.3:o:linux:linux_kernel:3.2.76
  • Linux Kernel 3.2.77
    cpe:2.3:o:linux:linux_kernel:3.2.77
  • Linux Kernel 3.2.78
    cpe:2.3:o:linux:linux_kernel:3.2.78
  • Linux Kernel 3.2.79
    cpe:2.3:o:linux:linux_kernel:3.2.79
  • Linux Kernel 3.2.80
    cpe:2.3:o:linux:linux_kernel:3.2.80
  • Linux Kernel 3.3
    cpe:2.3:o:linux:linux_kernel:3.3
  • Linux Kernel 3.3 release candidate 1
    cpe:2.3:o:linux:linux_kernel:3.3:rc1
  • Linux Kernel 3.3 release candidate 2
    cpe:2.3:o:linux:linux_kernel:3.3:rc2
  • Linux Kernel 3.3 release candidate 3
    cpe:2.3:o:linux:linux_kernel:3.3:rc3
  • Linux Kernel 3.3 release candidate 4
    cpe:2.3:o:linux:linux_kernel:3.3:rc4
  • Linux Kernel 3.3 release candidate 5
    cpe:2.3:o:linux:linux_kernel:3.3:rc5
  • Linux Kernel 3.3 release candidate 6
    cpe:2.3:o:linux:linux_kernel:3.3:rc6
  • Linux Kernel 3.3 release candidate 7
    cpe:2.3:o:linux:linux_kernel:3.3:rc7
  • Linux Kernel 3.3.1
    cpe:2.3:o:linux:linux_kernel:3.3.1
  • Linux Kernel 3.3.2
    cpe:2.3:o:linux:linux_kernel:3.3.2
  • Linux Kernel 3.3.3
    cpe:2.3:o:linux:linux_kernel:3.3.3
  • Linux Kernel 3.3.4
    cpe:2.3:o:linux:linux_kernel:3.3.4
  • Linux Kernel 3.3.5
    cpe:2.3:o:linux:linux_kernel:3.3.5
  • Linux Kernel 3.3.6
    cpe:2.3:o:linux:linux_kernel:3.3.6
  • Linux Kernel 3.3.7
    cpe:2.3:o:linux:linux_kernel:3.3.7
  • Linux Kernel 3.3.8
    cpe:2.3:o:linux:linux_kernel:3.3.8
  • Linux Kernel 3.4
    cpe:2.3:o:linux:linux_kernel:3.4
  • Linux Kernel 3.4 (x86)
    cpe:2.3:o:linux:linux_kernel:3.4:-:-:-:-:-:x86
  • Linux Kernel 3.4 release candidate 1
    cpe:2.3:o:linux:linux_kernel:3.4:rc1
  • Linux Kernel 3.4 release candidate 1 (x86)
    cpe:2.3:o:linux:linux_kernel:3.4:rc1:-:-:-:-:x86
  • Linux Kernel 3.4 release candidate 2
    cpe:2.3:o:linux:linux_kernel:3.4:rc2
  • Linux Kernel 3.4 release candidate 2 (x86)
    cpe:2.3:o:linux:linux_kernel:3.4:rc2:-:-:-:-:x86
  • Linux Kernel 3.4 release candidate 3
    cpe:2.3:o:linux:linux_kernel:3.4:rc3
  • Linux Kernel 3.4 release candidate 3 (x86)
    cpe:2.3:o:linux:linux_kernel:3.4:rc3:-:-:-:-:x86
  • Linux Kernel 3.4 release candidate 4
    cpe:2.3:o:linux:linux_kernel:3.4:rc4
  • Linux Kernel 3.4 release candidate 4 (x86)
    cpe:2.3:o:linux:linux_kernel:3.4:rc4:-:-:-:-:x86
  • Linux Kernel 3.4 release candidate 5
    cpe:2.3:o:linux:linux_kernel:3.4:rc5
  • Linux Kernel 3.4 release candidate 5 (x86)
    cpe:2.3:o:linux:linux_kernel:3.4:rc5:-:-:-:-:x86
  • Linux Kernel 3.4 release candidate 6
    cpe:2.3:o:linux:linux_kernel:3.4:rc6
  • Linux Kernel 3.4 release candidate 6 (x86)
    cpe:2.3:o:linux:linux_kernel:3.4:rc6:-:-:-:-:x86
  • Linux Kernel 3.4 release candidate 7
    cpe:2.3:o:linux:linux_kernel:3.4:rc7
  • Linux Kernel 3.4 release candidate 7 (x86)
    cpe:2.3:o:linux:linux_kernel:3.4:rc7:-:-:-:-:x86
  • Linux Kernel 3.4.1
    cpe:2.3:o:linux:linux_kernel:3.4.1
  • Linux Kernel 3.4.1 (x86)
    cpe:2.3:o:linux:linux_kernel:3.4.1:-:-:-:-:-:x86
  • Linux Kernel 3.4.2
    cpe:2.3:o:linux:linux_kernel:3.4.2
  • Linux Kernel 3.4.2 (x86)
    cpe:2.3:o:linux:linux_kernel:3.4.2:-:-:-:-:-:x86
  • Linux Kernel 3.4.3
    cpe:2.3:o:linux:linux_kernel:3.4.3
  • Linux Kernel 3.4.3 (x86)
    cpe:2.3:o:linux:linux_kernel:3.4.3:-:-:-:-:-:x86
  • Linux Kernel 3.4.4
    cpe:2.3:o:linux:linux_kernel:3.4.4
  • Linux Kernel 3.4.4 (x86)
    cpe:2.3:o:linux:linux_kernel:3.4.4:-:-:-:-:-:x86
  • Linux Kernel 3.4.5
    cpe:2.3:o:linux:linux_kernel:3.4.5
  • Linux Kernel 3.4.5 (x86)
    cpe:2.3:o:linux:linux_kernel:3.4.5:-:-:-:-:-:x86
  • Linux Kernel 3.4.6
    cpe:2.3:o:linux:linux_kernel:3.4.6
  • Linux Kernel 3.4.7
    cpe:2.3:o:linux:linux_kernel:3.4.7
  • Linux Kernel 3.4.8
    cpe:2.3:o:linux:linux_kernel:3.4.8
  • Linux Kernel 3.4.9
    cpe:2.3:o:linux:linux_kernel:3.4.9
  • Linux Kernel 3.4.10
    cpe:2.3:o:linux:linux_kernel:3.4.10
  • Linux Kernel 3.4.11
    cpe:2.3:o:linux:linux_kernel:3.4.11
  • Linux Kernel 3.4.12
    cpe:2.3:o:linux:linux_kernel:3.4.12
  • Linux Kernel 3.4.13
    cpe:2.3:o:linux:linux_kernel:3.4.13
  • Linux Kernel 3.4.14
    cpe:2.3:o:linux:linux_kernel:3.4.14
  • Linux Kernel 3.4.15
    cpe:2.3:o:linux:linux_kernel:3.4.15
  • Linux Kernel 3.4.16
    cpe:2.3:o:linux:linux_kernel:3.4.16
  • Linux Kernel 3.4.17
    cpe:2.3:o:linux:linux_kernel:3.4.17
  • Linux Kernel 3.4.18
    cpe:2.3:o:linux:linux_kernel:3.4.18
  • Linux Kernel 3.4.19
    cpe:2.3:o:linux:linux_kernel:3.4.19
  • Linux Kernel 3.4.20
    cpe:2.3:o:linux:linux_kernel:3.4.20
  • Linux Kernel 3.4.21
    cpe:2.3:o:linux:linux_kernel:3.4.21
  • Linux Kernel 3.4.22
    cpe:2.3:o:linux:linux_kernel:3.4.22
  • Linux Kernel 3.4.23
    cpe:2.3:o:linux:linux_kernel:3.4.23
  • Linux Kernel 3.4.24
    cpe:2.3:o:linux:linux_kernel:3.4.24
  • Linux Kernel 3.4.25
    cpe:2.3:o:linux:linux_kernel:3.4.25
  • Linux Kernel 3.4.26
    cpe:2.3:o:linux:linux_kernel:3.4.26
  • Linux Kernel 3.4.27
    cpe:2.3:o:linux:linux_kernel:3.4.27
  • Linux Kernel 3.4.28
    cpe:2.3:o:linux:linux_kernel:3.4.28
  • Linux Kernel 3.4.29
    cpe:2.3:o:linux:linux_kernel:3.4.29
  • Linux Kernel 3.4.30
    cpe:2.3:o:linux:linux_kernel:3.4.30
  • Linux Kernel 3.4.31
    cpe:2.3:o:linux:linux_kernel:3.4.31
  • Linux Kernel 3.4.32
    cpe:2.3:o:linux:linux_kernel:3.4.32
  • Linux Kernel 3.4.33
    cpe:2.3:o:linux:linux_kernel:3.4.33
  • Linux Kernel 3.4.34
    cpe:2.3:o:linux:linux_kernel:3.4.34
  • Linux Kernel 3.4.35
    cpe:2.3:o:linux:linux_kernel:3.4.35
  • Linux Kernel 3.4.36
    cpe:2.3:o:linux:linux_kernel:3.4.36
  • Linux Kernel 3.4.37
    cpe:2.3:o:linux:linux_kernel:3.4.37
  • Linux Kernel 3.4.38
    cpe:2.3:o:linux:linux_kernel:3.4.38
  • Linux Kernel 3.4.39
    cpe:2.3:o:linux:linux_kernel:3.4.39
  • Linux Kernel 3.4.40
    cpe:2.3:o:linux:linux_kernel:3.4.40
  • Linux Kernel 3.4.41
    cpe:2.3:o:linux:linux_kernel:3.4.41
  • Linux Kernel 3.4.42
    cpe:2.3:o:linux:linux_kernel:3.4.42
  • Linux Kernel 3.4.43
    cpe:2.3:o:linux:linux_kernel:3.4.43
  • Linux Kernel 3.4.44
    cpe:2.3:o:linux:linux_kernel:3.4.44
  • Linux Kernel 3.4.45
    cpe:2.3:o:linux:linux_kernel:3.4.45
  • Linux Kernel 3.4.46
    cpe:2.3:o:linux:linux_kernel:3.4.46
  • Linux Kernel 3.4.47
    cpe:2.3:o:linux:linux_kernel:3.4.47
  • Linux Kernel 3.4.48
    cpe:2.3:o:linux:linux_kernel:3.4.48
  • Linux Kernel 3.4.49
    cpe:2.3:o:linux:linux_kernel:3.4.49
  • Linux Kernel 3.4.50
    cpe:2.3:o:linux:linux_kernel:3.4.50
  • Linux Kernel 3.4.51
    cpe:2.3:o:linux:linux_kernel:3.4.51
  • Linux Kernel 3.4.52
    cpe:2.3:o:linux:linux_kernel:3.4.52
  • Linux Kernel 3.4.53
    cpe:2.3:o:linux:linux_kernel:3.4.53
  • Linux Kernel 3.4.54
    cpe:2.3:o:linux:linux_kernel:3.4.54
  • Linux Kernel 3.4.55
    cpe:2.3:o:linux:linux_kernel:3.4.55
  • Linux Kernel 3.4.56
    cpe:2.3:o:linux:linux_kernel:3.4.56
  • Linux Kernel 3.4.57
    cpe:2.3:o:linux:linux_kernel:3.4.57
  • Linux Kernel 3.4.58
    cpe:2.3:o:linux:linux_kernel:3.4.58
  • Linux Kernel 3.4.59
    cpe:2.3:o:linux:linux_kernel:3.4.59
  • Linux Kernel 3.4.60
    cpe:2.3:o:linux:linux_kernel:3.4.60
  • Linux Kernel 3.4.61
    cpe:2.3:o:linux:linux_kernel:3.4.61
  • Linux Kernel 3.4.62
    cpe:2.3:o:linux:linux_kernel:3.4.62
  • Linux Kernel 3.4.63
    cpe:2.3:o:linux:linux_kernel:3.4.63
  • Linux Kernel 3.4.64
    cpe:2.3:o:linux:linux_kernel:3.4.64
  • Linux Kernel 3.4.65
    cpe:2.3:o:linux:linux_kernel:3.4.65
  • Linux Kernel 3.4.66
    cpe:2.3:o:linux:linux_kernel:3.4.66
  • Linux Kernel 3.4.67
    cpe:2.3:o:linux:linux_kernel:3.4.67
  • Linux Kernel 3.4.68
    cpe:2.3:o:linux:linux_kernel:3.4.68
  • Linux Kernel 3.4.69
    cpe:2.3:o:linux:linux_kernel:3.4.69
  • Linux Kernel 3.4.70
    cpe:2.3:o:linux:linux_kernel:3.4.70
  • Linux Kernel 3.4.71
    cpe:2.3:o:linux:linux_kernel:3.4.71
  • Linux Kernel 3.4.72
    cpe:2.3:o:linux:linux_kernel:3.4.72
  • Linux Kernel 3.4.73
    cpe:2.3:o:linux:linux_kernel:3.4.73
  • Linux Kernel 3.4.74
    cpe:2.3:o:linux:linux_kernel:3.4.74
  • Linux Kernel 3.4.75
    cpe:2.3:o:linux:linux_kernel:3.4.75
  • Linux Kernel 3.4.76
    cpe:2.3:o:linux:linux_kernel:3.4.76
  • Linux Kernel 3.4.77
    cpe:2.3:o:linux:linux_kernel:3.4.77
  • Linux Kernel 3.4.78
    cpe:2.3:o:linux:linux_kernel:3.4.78
  • Linux Kernel 3.4.79
    cpe:2.3:o:linux:linux_kernel:3.4.79
  • Linux Kernel 3.4.80
    cpe:2.3:o:linux:linux_kernel:3.4.80
  • Linux Kernel 3.4.81
    cpe:2.3:o:linux:linux_kernel:3.4.81
  • Linux Kernel 3.4.82
    cpe:2.3:o:linux:linux_kernel:3.4.82
  • Linux Kernel 3.4.83
    cpe:2.3:o:linux:linux_kernel:3.4.83
  • Linux Kernel 3.4.84
    cpe:2.3:o:linux:linux_kernel:3.4.84
  • Linux Kernel 3.4.85
    cpe:2.3:o:linux:linux_kernel:3.4.85
  • Linux Kernel 3.4.86
    cpe:2.3:o:linux:linux_kernel:3.4.86
  • Linux Kernel 3.4.87
    cpe:2.3:o:linux:linux_kernel:3.4.87
  • Linux Kernel 3.4.88
    cpe:2.3:o:linux:linux_kernel:3.4.88
  • Linux Kernel 3.4.89
    cpe:2.3:o:linux:linux_kernel:3.4.89
  • Linux Kernel 3.4.90
    cpe:2.3:o:linux:linux_kernel:3.4.90
  • Linux Kernel 3.4.91
    cpe:2.3:o:linux:linux_kernel:3.4.91
  • Linux Kernel 3.4.92
    cpe:2.3:o:linux:linux_kernel:3.4.92
  • Linux Kernel 3.4.93
    cpe:2.3:o:linux:linux_kernel:3.4.93
  • Linux Kernel 3.4.94
    cpe:2.3:o:linux:linux_kernel:3.4.94
  • Linux Kernel 3.4.95
    cpe:2.3:o:linux:linux_kernel:3.4.95
  • Linux Kernel 3.4.96
    cpe:2.3:o:linux:linux_kernel:3.4.96
  • Linux Kernel 3.4.97
    cpe:2.3:o:linux:linux_kernel:3.4.97
  • Linux Kernel 3.4.98
    cpe:2.3:o:linux:linux_kernel:3.4.98
  • Linux Kernel 3.4.99
    cpe:2.3:o:linux:linux_kernel:3.4.99
  • Linux Kernel 3.4.100
    cpe:2.3:o:linux:linux_kernel:3.4.100
  • Linux Kernel 3.4.101
    cpe:2.3:o:linux:linux_kernel:3.4.101
  • Linux Kernel 3.4.102
    cpe:2.3:o:linux:linux_kernel:3.4.102
  • Linux Kernel 3.4.103
    cpe:2.3:o:linux:linux_kernel:3.4.103
  • Linux Kernel 3.4.104
    cpe:2.3:o:linux:linux_kernel:3.4.104
  • Linux Kernel 3.4.105
    cpe:2.3:o:linux:linux_kernel:3.4.105
  • Linux Kernel 3.4.106
    cpe:2.3:o:linux:linux_kernel:3.4.106
  • Linux Kernel 3.4.107
    cpe:2.3:o:linux:linux_kernel:3.4.107
  • Linux Kernel 3.4.108
    cpe:2.3:o:linux:linux_kernel:3.4.108
  • Linux Kernel 3.4.109
    cpe:2.3:o:linux:linux_kernel:3.4.109
  • Linux Kernel 3.4.110
    cpe:2.3:o:linux:linux_kernel:3.4.110
  • Linux Kernel 3.4.111
    cpe:2.3:o:linux:linux_kernel:3.4.111
  • Linux Kernel 3.4.112
    cpe:2.3:o:linux:linux_kernel:3.4.112
  • Linux Kernel 3.5
    cpe:2.3:o:linux:linux_kernel:3.5
  • Linux Kernel 3.5.1
    cpe:2.3:o:linux:linux_kernel:3.5.1
  • Linux Kernel 3.5.2
    cpe:2.3:o:linux:linux_kernel:3.5.2
  • Linux Kernel 3.5.3
    cpe:2.3:o:linux:linux_kernel:3.5.3
  • Linux Kernel 3.5.4
    cpe:2.3:o:linux:linux_kernel:3.5.4
  • Linux Kernel 3.5.5
    cpe:2.3:o:linux:linux_kernel:3.5.5
  • Linux Kernel 3.5.6
    cpe:2.3:o:linux:linux_kernel:3.5.6
  • Linux Kernel 3.5.7
    cpe:2.3:o:linux:linux_kernel:3.5.7
  • Linux Kernel 3.6
    cpe:2.3:o:linux:linux_kernel:3.6
  • Linux Kernel 3.6 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:3.6:rc5
  • Linux Kernel 3.6.1
    cpe:2.3:o:linux:linux_kernel:3.6.1
  • Linux Kernel 3.6.2
    cpe:2.3:o:linux:linux_kernel:3.6.2
  • Linux Kernel 3.6.3
    cpe:2.3:o:linux:linux_kernel:3.6.3
  • Linux Kernel 3.6.4
    cpe:2.3:o:linux:linux_kernel:3.6.4
  • Linux Kernel 3.6.5
    cpe:2.3:o:linux:linux_kernel:3.6.5
  • Linux Kernel 3.6.6
    cpe:2.3:o:linux:linux_kernel:3.6.6
  • Linux Kernel 3.6.7
    cpe:2.3:o:linux:linux_kernel:3.6.7
  • Linux Kernel 3.6.8
    cpe:2.3:o:linux:linux_kernel:3.6.8
  • Linux Kernel 3.6.9
    cpe:2.3:o:linux:linux_kernel:3.6.9
  • Linux Kernel 3.6.10
    cpe:2.3:o:linux:linux_kernel:3.6.10
  • Linux Kernel 3.6.11
    cpe:2.3:o:linux:linux_kernel:3.6.11
  • Linux Kernel 3.7
    cpe:2.3:o:linux:linux_kernel:3.7
  • Linux Kernel 3.7.1
    cpe:2.3:o:linux:linux_kernel:3.7.1
  • Linux Kernel 3.7.2
    cpe:2.3:o:linux:linux_kernel:3.7.2
  • Linux Kernel 3.7.3
    cpe:2.3:o:linux:linux_kernel:3.7.3
  • Linux Kernel 3.7.4
    cpe:2.3:o:linux:linux_kernel:3.7.4
  • Linux Kernel 3.7.5
    cpe:2.3:o:linux:linux_kernel:3.7.5
  • Linux Kernel 3.7.6
    cpe:2.3:o:linux:linux_kernel:3.7.6
  • Linux Kernel 3.7.7
    cpe:2.3:o:linux:linux_kernel:3.7.7
  • Linux Kernel 3.7.8
    cpe:2.3:o:linux:linux_kernel:3.7.8
  • Linux Kernel 3.7.9
    cpe:2.3:o:linux:linux_kernel:3.7.9
  • Linux Kernel 3.7.10
    cpe:2.3:o:linux:linux_kernel:3.7.10
  • Linux Kernel 3.8
    cpe:2.3:o:linux:linux_kernel:3.8
  • Linux Kernel 3.8.0
    cpe:2.3:o:linux:linux_kernel:3.8.0
  • Linux Kernel 3.8.1
    cpe:2.3:o:linux:linux_kernel:3.8.1
  • Linux Kernel 3.8.2
    cpe:2.3:o:linux:linux_kernel:3.8.2
  • Linux Kernel 3.8.3
    cpe:2.3:o:linux:linux_kernel:3.8.3
  • Linux Kernel 3.8.4
    cpe:2.3:o:linux:linux_kernel:3.8.4
  • Linux Kernel 3.8.5
    cpe:2.3:o:linux:linux_kernel:3.8.5
  • Linux Kernel 3.8.6
    cpe:2.3:o:linux:linux_kernel:3.8.6
  • Linux Kernel 3.8.7
    cpe:2.3:o:linux:linux_kernel:3.8.7
  • Linux Kernel 3.8.8
    cpe:2.3:o:linux:linux_kernel:3.8.8
  • Linux Kernel 3.8.9
    cpe:2.3:o:linux:linux_kernel:3.8.9
  • Linux Kernel 3.8.10
    cpe:2.3:o:linux:linux_kernel:3.8.10
  • Linux Kernel 3.8.11
    cpe:2.3:o:linux:linux_kernel:3.8.11
  • Linux Kernel 3.8.12
    cpe:2.3:o:linux:linux_kernel:3.8.12
  • Linux Kernel 3.8.13
    cpe:2.3:o:linux:linux_kernel:3.8.13
  • Linux Kernel 3.9
    cpe:2.3:o:linux:linux_kernel:3.9
  • Linux Kernel 3.9 release candidate 1
    cpe:2.3:o:linux:linux_kernel:3.9:rc1
  • Linux Kernel 3.9 release candidate 2
    cpe:2.3:o:linux:linux_kernel:3.9:rc2
  • Linux Kernel 3.9 release candidate 3
    cpe:2.3:o:linux:linux_kernel:3.9:rc3
  • Linux Kernel 3.9 release candidate 4
    cpe:2.3:o:linux:linux_kernel:3.9:rc4
  • Linux Kernel 3.9 release candidate 5
    cpe:2.3:o:linux:linux_kernel:3.9:rc5
  • Linux Kernel 3.9 release candidate 6
    cpe:2.3:o:linux:linux_kernel:3.9:rc6
  • Linux Kernel 3.9 release candidate 7
    cpe:2.3:o:linux:linux_kernel:3.9:rc7
  • Linux Kernel 3.9.0
    cpe:2.3:o:linux:linux_kernel:3.9.0
  • Linux Kernel 3.9.0 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.9.0:-:-:-:-:-:arm64
  • Linux Kernel 3.9.1
    cpe:2.3:o:linux:linux_kernel:3.9.1
  • Linux Kernel 3.9.1 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.9.1:-:-:-:-:-:arm64
  • Linux Kernel 3.9.2
    cpe:2.3:o:linux:linux_kernel:3.9.2
  • Linux Kernel 3.9.2 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.9.2:-:-:-:-:-:arm64
  • Linux Kernel 3.9.3
    cpe:2.3:o:linux:linux_kernel:3.9.3
  • Linux Kernel 3.9.3 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.9.3:-:-:-:-:-:arm64
  • Linux Kernel 3.9.4
    cpe:2.3:o:linux:linux_kernel:3.9.4
  • Linux Kernel 3.9.4 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.9.4:-:-:-:-:-:arm64
  • Linux Kernel 3.9.5
    cpe:2.3:o:linux:linux_kernel:3.9.5
  • Linux Kernel 3.9.5 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.9.5:-:-:-:-:-:arm64
  • Linux Kernel 3.9.6
    cpe:2.3:o:linux:linux_kernel:3.9.6
  • Linux Kernel 3.9.6 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.9.6:-:-:-:-:-:arm64
  • Linux Kernel 3.9.7
    cpe:2.3:o:linux:linux_kernel:3.9.7
  • Linux Kernel 3.9.7 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.9.7:-:-:-:-:-:arm64
  • Linux Kernel 3.9.8
    cpe:2.3:o:linux:linux_kernel:3.9.8
  • Linux Kernel 3.9.8 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.9.8:-:-:-:-:-:arm64
  • Linux Kernel 3.9.9
    cpe:2.3:o:linux:linux_kernel:3.9.9
  • Linux Kernel 3.9.9 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.9.9:-:-:-:-:-:arm64
  • Linux Kernel 3.9.10
    cpe:2.3:o:linux:linux_kernel:3.9.10
  • Linux Kernel 3.9.10 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.9.10:-:-:-:-:-:arm64
  • Linux Kernel 3.9.11
    cpe:2.3:o:linux:linux_kernel:3.9.11
  • Linux Kernel 3.9.11 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.9.11:-:-:-:-:-:arm64
  • Linux Kernel 3.10
    cpe:2.3:o:linux:linux_kernel:3.10
  • Linux Kernel 3.10.0 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.10.0:-:-:-:-:-:arm64
  • Linux Kernel 3.10.1
    cpe:2.3:o:linux:linux_kernel:3.10.1
  • Linux Kernel 3.10.1 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.10.1:-:-:-:-:-:arm64
  • Linux Kernel 3.10.2
    cpe:2.3:o:linux:linux_kernel:3.10.2
  • Linux Kernel 3.10.2 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.10.2:-:-:-:-:-:arm64
  • Linux Kernel 3.10.3
    cpe:2.3:o:linux:linux_kernel:3.10.3
  • Linux Kernel 3.10.3 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.10.3:-:-:-:-:-:arm64
  • Linux Kernel 3.10.4
    cpe:2.3:o:linux:linux_kernel:3.10.4
  • Linux Kernel 3.10.4 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.10.4:-:-:-:-:-:arm64
  • Linux Kernel 3.10.5
    cpe:2.3:o:linux:linux_kernel:3.10.5
  • Linux Kernel 3.10.5 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.10.5:-:-:-:-:-:arm64
  • Linux Kernel 3.10.6
    cpe:2.3:o:linux:linux_kernel:3.10.6
  • Linux Kernel 3.10.6 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.10.6:-:-:-:-:-:arm64
  • Linux Kernel 3.10.7
    cpe:2.3:o:linux:linux_kernel:3.10.7
  • Linux Kernel 3.10.7 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.10.7:-:-:-:-:-:arm64
  • Linux Kernel 3.10.8
    cpe:2.3:o:linux:linux_kernel:3.10.8
  • Linux Kernel 3.10.8 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.10.8:-:-:-:-:-:arm64
  • Linux Kernel 3.10.9
    cpe:2.3:o:linux:linux_kernel:3.10.9
  • Linux Kernel 3.10.9 on ARM64 architecture
    cpe:2.3:o:linux:linux_kernel:3.10.9:-:-:-:-:-:arm64
  • Linux Kernel 3.10.10
    cpe:2.3:o:linux:linux_kernel:3.10.10
  • Linux Kernel 3.10.11
    cpe:2.3:o:linux:linux_kernel:3.10.11
  • Linux Kernel 3.10.2
    cpe:2.3:o:linux:linux_kernel:3.10.12
  • Linux Kernel 3.10.13
    cpe:2.3:o:linux:linux_kernel:3.10.13
  • Linux Kernel 3.10.14
    cpe:2.3:o:linux:linux_kernel:3.10.14
  • Linux Kernel 3.10.15
    cpe:2.3:o:linux:linux_kernel:3.10.15
  • Linux Kernel 3.10.16
    cpe:2.3:o:linux:linux_kernel:3.10.16
  • Linux Kernel 3.10.17
    cpe:2.3:o:linux:linux_kernel:3.10.17
  • Linux Kernel 3.10.18
    cpe:2.3:o:linux:linux_kernel:3.10.18
  • Linux Kernel 3.10.19
    cpe:2.3:o:linux:linux_kernel:3.10.19
  • Linux Kernel 3.10.20
    cpe:2.3:o:linux:linux_kernel:3.10.20
  • Linux Kernel 3.10.21
    cpe:2.3:o:linux:linux_kernel:3.10.21
  • Linux Kernel 3.10.22
    cpe:2.3:o:linux:linux_kernel:3.10.22
  • Linux Kernel 3.10.23
    cpe:2.3:o:linux:linux_kernel:3.10.23
  • Linux Kernel 3.10.24
    cpe:2.3:o:linux:linux_kernel:3.10.24
  • Linux Kernel 3.10.25
    cpe:2.3:o:linux:linux_kernel:3.10.25
  • Linux Kernel 3.10.26
    cpe:2.3:o:linux:linux_kernel:3.10.26
  • Linux Kernel 3.10.27
    cpe:2.3:o:linux:linux_kernel:3.10.27
  • Linux Kernel 3.10.28
    cpe:2.3:o:linux:linux_kernel:3.10.28
  • Linux Kernel 3.10.29
    cpe:2.3:o:linux:linux_kernel:3.10.29
  • Linux Kernel 3.10.30
    cpe:2.3:o:linux:linux_kernel:3.10.30
  • Linux Kernel 3.10.31
    cpe:2.3:o:linux:linux_kernel:3.10.31
  • Linux Kernel 3.10.32
    cpe:2.3:o:linux:linux_kernel:3.10.32
  • Linux Kernel 3.10.33
    cpe:2.3:o:linux:linux_kernel:3.10.33
  • Linux Kernel 3.10.34
    cpe:2.3:o:linux:linux_kernel:3.10.34
  • Linux Kernel 3.10.35
    cpe:2.3:o:linux:linux_kernel:3.10.35
  • Linux Kernel 3.10.36
    cpe:2.3:o:linux:linux_kernel:3.10.36
  • Linux Kernel 3.10.37
    cpe:2.3:o:linux:linux_kernel:3.10.37
  • Linux Kernel 3.10.38
    cpe:2.3:o:linux:linux_kernel:3.10.38
  • Linux Kernel 3.10.39
    cpe:2.3:o:linux:linux_kernel:3.10.39
  • Linux Kernel 3.10.40
    cpe:2.3:o:linux:linux_kernel:3.10.40
  • Linux Kernel 3.10.41
    cpe:2.3:o:linux:linux_kernel:3.10.41
  • Linux Kernel 3.10.42
    cpe:2.3:o:linux:linux_kernel:3.10.42
  • Linux Kernel 3.10.43
    cpe:2.3:o:linux:linux_kernel:3.10.43
  • Linux Kernel 3.10.44
    cpe:2.3:o:linux:linux_kernel:3.10.44
  • Linux Kernel 3.10.45
    cpe:2.3:o:linux:linux_kernel:3.10.45
  • Linux Kernel 3.10.46
    cpe:2.3:o:linux:linux_kernel:3.10.46
  • Linux Kernel 3.10.47
    cpe:2.3:o:linux:linux_kernel:3.10.47
  • Linux Kernel 3.10.48
    cpe:2.3:o:linux:linux_kernel:3.10.48
  • Linux Kernel 3.10.49
    cpe:2.3:o:linux:linux_kernel:3.10.49
  • Linux Kernel 3.10.50
    cpe:2.3:o:linux:linux_kernel:3.10.50
  • Linux Kernel 3.10.51
    cpe:2.3:o:linux:linux_kernel:3.10.51
  • Linux Kernel 3.10.52
    cpe:2.3:o:linux:linux_kernel:3.10.52
  • Linux Kernel 3.10.53
    cpe:2.3:o:linux:linux_kernel:3.10.53
  • Linux Kernel 3.10.54
    cpe:2.3:o:linux:linux_kernel:3.10.54
  • Linux Kernel 3.10.55
    cpe:2.3:o:linux:linux_kernel:3.10.55
  • Linux Kernel 3.10.56
    cpe:2.3:o:linux:linux_kernel:3.10.56
  • Linux Kernel 3.10.57
    cpe:2.3:o:linux:linux_kernel:3.10.57
  • Linux Kernel 3.10.58
    cpe:2.3:o:linux:linux_kernel:3.10.58
  • Linux Kernel 3.10.59
    cpe:2.3:o:linux:linux_kernel:3.10.59
  • Linux Kernel 3.10.60
    cpe:2.3:o:linux:linux_kernel:3.10.60
  • Linux Kernel 3.10.61
    cpe:2.3:o:linux:linux_kernel:3.10.61
  • Linux Kernel 3.10.62
    cpe:2.3:o:linux:linux_kernel:3.10.62
  • Linux Kernel 3.10.63
    cpe:2.3:o:linux:linux_kernel:3.10.63
  • Linux Kernel 3.10.64
    cpe:2.3:o:linux:linux_kernel:3.10.64
  • Linux Kernel 3.10.65
    cpe:2.3:o:linux:linux_kernel:3.10.65
  • Linux Kernel 3.10.66
    cpe:2.3:o:linux:linux_kernel:3.10.66
  • Linux Kernel 3.10.67
    cpe:2.3:o:linux:linux_kernel:3.10.67
  • Linux Kernel 3.10.68
    cpe:2.3:o:linux:linux_kernel:3.10.68
  • Linux Kernel 3.10.69
    cpe:2.3:o:linux:linux_kernel:3.10.69
  • Linux Kernel 3.10.70
    cpe:2.3:o:linux:linux_kernel:3.10.70
  • Linux Kernel 3.10.71
    cpe:2.3:o:linux:linux_kernel:3.10.71
  • Linux Kernel 3.10.72
    cpe:2.3:o:linux:linux_kernel:3.10.72
  • Linux Kernel 3.10.73
    cpe:2.3:o:linux:linux_kernel:3.10.73
  • Linux Kernel 3.10.74
    cpe:2.3:o:linux:linux_kernel:3.10.74
  • Linux Kernel 3.10.75
    cpe:2.3:o:linux:linux_kernel:3.10.75
  • Linux Kernel 3.10.76
    cpe:2.3:o:linux:linux_kernel:3.10.76
  • Linux Kernel 3.10.77
    cpe:2.3:o:linux:linux_kernel:3.10.77
  • Linux Kernel 3.10.78
    cpe:2.3:o:linux:linux_kernel:3.10.78
  • Linux Kernel 3.10.79
    cpe:2.3:o:linux:linux_kernel:3.10.79
  • Linux Kernel 3.10.80
    cpe:2.3:o:linux:linux_kernel:3.10.80
  • Linux Kernel 3.10.81
    cpe:2.3:o:linux:linux_kernel:3.10.81
  • Linux Kernel 3.10.82
    cpe:2.3:o:linux:linux_kernel:3.10.82
  • Linux Kernel 3.10.83
    cpe:2.3:o:linux:linux_kernel:3.10.83
  • Linux Kernel 3.10.84
    cpe:2.3:o:linux:linux_kernel:3.10.84
  • Linux Kernel 3.10.85
    cpe:2.3:o:linux:linux_kernel:3.10.85
  • Linux Kernel 3.10.86
    cpe:2.3:o:linux:linux_kernel:3.10.86
  • Linux Kernel 3.10.87
    cpe:2.3:o:linux:linux_kernel:3.10.87
  • Linux Kernel 3.10.88
    cpe:2.3:o:linux:linux_kernel:3.10.88
  • Linux Kernel 3.10.89
    cpe:2.3:o:linux:linux_kernel:3.10.89
  • Linux Kernel 3.10.90
    cpe:2.3:o:linux:linux_kernel:3.10.90
  • Linux Kernel 3.10.91
    cpe:2.3:o:linux:linux_kernel:3.10.91
  • Linux Kernel 3.10.92
    cpe:2.3:o:linux:linux_kernel:3.10.92
  • Linux Kernel 3.10.93
    cpe:2.3:o:linux:linux_kernel:3.10.93
  • Linux Kernel 3.10.94
    cpe:2.3:o:linux:linux_kernel:3.10.94
  • Linux Kernel 3.10.95
    cpe:2.3:o:linux:linux_kernel:3.10.95
  • Linux Kernel 3.10.96
    cpe:2.3:o:linux:linux_kernel:3.10.96
  • Linux Kernel 3.10.97
    cpe:2.3:o:linux:linux_kernel:3.10.97
  • Linux Kernel 3.10.98
    cpe:2.3:o:linux:linux_kernel:3.10.98
  • Linux Kernel 3.10.99
    cpe:2.3:o:linux:linux_kernel:3.10.99
  • Linux Kernel 3.10.100
    cpe:2.3:o:linux:linux_kernel:3.10.100
  • Linux Kernel 3.10.101
    cpe:2.3:o:linux:linux_kernel:3.10.101
  • Linux Kernel 3.10.102
    cpe:2.3:o:linux:linux_kernel:3.10.102
  • Linux Kernel 3.11
    cpe:2.3:o:linux:linux_kernel:3.11
  • Linux Kernel 3.11.1
    cpe:2.3:o:linux:linux_kernel:3.11.1
  • Linux Kernel 3.11.2
    cpe:2.3:o:linux:linux_kernel:3.11.2
  • Linux Kernel 3.11.3
    cpe:2.3:o:linux:linux_kernel:3.11.3
  • Linux Kernel 3.11.4
    cpe:2.3:o:linux:linux_kernel:3.11.4
  • Linux Kernel 3.11.5
    cpe:2.3:o:linux:linux_kernel:3.11.5
  • Linux Kernel 3.11.6
    cpe:2.3:o:linux:linux_kernel:3.11.6
  • Linux Kernel 3.11.7
    cpe:2.3:o:linux:linux_kernel:3.11.7
  • Linux Kernel 3.11.8
    cpe:2.3:o:linux:linux_kernel:3.11.8
  • Linux Kernel 3.11.9
    cpe:2.3:o:linux:linux_kernel:3.11.9
  • Linux Kernel 3.11.10
    cpe:2.3:o:linux:linux_kernel:3.11.10
  • Linux Kernel 3.12
    cpe:2.3:o:linux:linux_kernel:3.12
  • Linux Kernel 3.12.1
    cpe:2.3:o:linux:linux_kernel:3.12.1
  • Linux Kernel 3.12.2
    cpe:2.3:o:linux:linux_kernel:3.12.2
  • Linux Kernel 3.12.3
    cpe:2.3:o:linux:linux_kernel:3.12.3
  • Linux Kernel 3.12.4
    cpe:2.3:o:linux:linux_kernel:3.12.4
  • Linux Kernel 3.12.5
    cpe:2.3:o:linux:linux_kernel:3.12.5
  • Linux Kernel 3.12.6
    cpe:2.3:o:linux:linux_kernel:3.12.6
  • Linux Kernel 3.12.7
    cpe:2.3:o:linux:linux_kernel:3.12.7
  • Linux Kernel 3.12.8
    cpe:2.3:o:linux:linux_kernel:3.12.8
  • Linux Kernel 3.12.9
    cpe:2.3:o:linux:linux_kernel:3.12.9
  • Linux Kernel 3.12.10
    cpe:2.3:o:linux:linux_kernel:3.12.10
  • Linux Kernel 3.12.11
    cpe:2.3:o:linux:linux_kernel:3.12.11
  • Linux Kernel 3.12.12
    cpe:2.3:o:linux:linux_kernel:3.12.12
  • Linux Kernel 3.12.13
    cpe:2.3:o:linux:linux_kernel:3.12.13
  • Linux Kernel 3.12.14
    cpe:2.3:o:linux:linux_kernel:3.12.14
  • Linux Kernel 3.12.15
    cpe:2.3:o:linux:linux_kernel:3.12.15
  • Linux Kernel 3.12.16
    cpe:2.3:o:linux:linux_kernel:3.12.16
  • Linux Kernel 3.12.17
    cpe:2.3:o:linux:linux_kernel:3.12.17
  • Linux Kernel 3.12.18
    cpe:2.3:o:linux:linux_kernel:3.12.18
  • Linux Kernel 3.12.19
    cpe:2.3:o:linux:linux_kernel:3.12.19
  • Linux Kernel 3.12.20
    cpe:2.3:o:linux:linux_kernel:3.12.20
  • Linux Kernel 3.12.21
    cpe:2.3:o:linux:linux_kernel:3.12.21
  • Linux Kernel 3.12.22
    cpe:2.3:o:linux:linux_kernel:3.12.22
  • Linux Kernel 3.12.23
    cpe:2.3:o:linux:linux_kernel:3.12.23
  • Linux Kernel 3.12.24
    cpe:2.3:o:linux:linux_kernel:3.12.24
  • Linux Kernel 3.12.25
    cpe:2.3:o:linux:linux_kernel:3.12.25
  • Linux Kernel 3.12.26
    cpe:2.3:o:linux:linux_kernel:3.12.26
  • Linux Kernel 3.12.27
    cpe:2.3:o:linux:linux_kernel:3.12.27
  • Linux Kernel 3.12.28
    cpe:2.3:o:linux:linux_kernel:3.12.28
  • Linux Kernel 3.12.29
    cpe:2.3:o:linux:linux_kernel:3.12.29
  • Linux Kernel 3.12.30
    cpe:2.3:o:linux:linux_kernel:3.12.30
  • Linux Kernel 3.12.31
    cpe:2.3:o:linux:linux_kernel:3.12.31
  • Linux Kernel 3.12.32
    cpe:2.3:o:linux:linux_kernel:3.12.32
  • Linux Kernel 3.12.33
    cpe:2.3:o:linux:linux_kernel:3.12.33
  • Linux Kernel 3.12.34
    cpe:2.3:o:linux:linux_kernel:3.12.34
  • Linux Kernel 3.12.35
    cpe:2.3:o:linux:linux_kernel:3.12.35
  • Linux Kernel 3.12.36
    cpe:2.3:o:linux:linux_kernel:3.12.36
  • Linux Kernel 3.12.37
    cpe:2.3:o:linux:linux_kernel:3.12.37
  • Linux Kernel 3.12.38
    cpe:2.3:o:linux:linux_kernel:3.12.38
  • Linux Kernel 3.12.39
    cpe:2.3:o:linux:linux_kernel:3.12.39
  • Linux Kernel 3.12.40
    cpe:2.3:o:linux:linux_kernel:3.12.40
  • Linux Kernel 3.12.41
    cpe:2.3:o:linux:linux_kernel:3.12.41
  • Linux Kernel 3.12.42
    cpe:2.3:o:linux:linux_kernel:3.12.42
  • Linux Kernel 3.12.43
    cpe:2.3:o:linux:linux_kernel:3.12.43
  • Linux Kernel 3.12.44
    cpe:2.3:o:linux:linux_kernel:3.12.44
  • Linux Kernel 3.12.45
    cpe:2.3:o:linux:linux_kernel:3.12.45
  • Linux Kernel 3.12.46
    cpe:2.3:o:linux:linux_kernel:3.12.46
  • Linux Kernel 3.12.47
    cpe:2.3:o:linux:linux_kernel:3.12.47
  • Linux Kernel 3.12.48
    cpe:2.3:o:linux:linux_kernel:3.12.48
  • Linux Kernel 3.12.49
    cpe:2.3:o:linux:linux_kernel:3.12.49
  • Linux Kernel 3.12.50
    cpe:2.3:o:linux:linux_kernel:3.12.50
  • Linux Kernel 3.12.51
    cpe:2.3:o:linux:linux_kernel:3.12.51
  • Linux Kernel 3.12.52
    cpe:2.3:o:linux:linux_kernel:3.12.52
  • Linux Kernel 3.12.53
    cpe:2.3:o:linux:linux_kernel:3.12.53
  • Linux Kernel 3.12.54
    cpe:2.3:o:linux:linux_kernel:3.12.54
  • Linux Kernel 3.12.55
    cpe:2.3:o:linux:linux_kernel:3.12.55
  • Linux Kernel 3.12.56
    cpe:2.3:o:linux:linux_kernel:3.12.56
  • Linux Kernel 3.12.57
    cpe:2.3:o:linux:linux_kernel:3.12.57
  • Linux Kernel 3.12.58
    cpe:2.3:o:linux:linux_kernel:3.12.58
  • Linux Kernel 3.12.59
    cpe:2.3:o:linux:linux_kernel:3.12.59
  • Linux Kernel 3.13
    cpe:2.3:o:linux:linux_kernel:3.13
  • Linux Kernel 3.13.1
    cpe:2.3:o:linux:linux_kernel:3.13.1
  • Linux Kernel 3.13.2
    cpe:2.3:o:linux:linux_kernel:3.13.2
  • Linux Kernel 3.13.3
    cpe:2.3:o:linux:linux_kernel:3.13.3
  • Linux Kernel 3.13.4
    cpe:2.3:o:linux:linux_kernel:3.13.4
  • Linux Kernel 3.13.5
    cpe:2.3:o:linux:linux_kernel:3.13.5
  • Linux Kernel 3.13.6
    cpe:2.3:o:linux:linux_kernel:3.13.6
  • Linux Kernel 3.13.7
    cpe:2.3:o:linux:linux_kernel:3.13.7
  • Linux Kernel 3.13.8
    cpe:2.3:o:linux:linux_kernel:3.13.8
  • Linux Kernel 3.13.9
    cpe:2.3:o:linux:linux_kernel:3.13.9
  • Linux Kernel 3.13.10
    cpe:2.3:o:linux:linux_kernel:3.13.10
  • Linux Kernel 3.13.11
    cpe:2.3:o:linux:linux_kernel:3.13.11
  • Linux Kernel 3.14
    cpe:2.3:o:linux:linux_kernel:3.14
  • Linux Kernel 3.14 release candidate 1
    cpe:2.3:o:linux:linux_kernel:3.14:rc1
  • Linux Kernel 3.14 release candidate 2
    cpe:2.3:o:linux:linux_kernel:3.14:rc2
  • Linux Kernel 3.14 release candidate 3
    cpe:2.3:o:linux:linux_kernel:3.14:rc3
  • Linux Kernel 3.14 release candidate 4
    cpe:2.3:o:linux:linux_kernel:3.14:rc4
  • Linux Kernel 3.14 release candidate 5
    cpe:2.3:o:linux:linux_kernel:3.14:rc5
  • Linux Kernel 3.14 release candidate 6
    cpe:2.3:o:linux:linux_kernel:3.14:rc6
  • Linux Kernel 3.14 release candidate 7
    cpe:2.3:o:linux:linux_kernel:3.14:rc7
  • Linux Kernel 3.14 release candidate 8
    cpe:2.3:o:linux:linux_kernel:3.14:rc8
  • Linux Kernel 3.14.1
    cpe:2.3:o:linux:linux_kernel:3.14.1
  • Linux Kernel 3.14.2
    cpe:2.3:o:linux:linux_kernel:3.14.2
  • Linux Kernel 3.14.3
    cpe:2.3:o:linux:linux_kernel:3.14.3
  • Linux Kernel 3.14.4
    cpe:2.3:o:linux:linux_kernel:3.14.4
  • Linux Kernel 3.14.5
    cpe:2.3:o:linux:linux_kernel:3.14.5
  • Linux Kernel 3.14.10
    cpe:2.3:o:linux:linux_kernel:3.14.10
  • Linux Kernel 3.14.11
    cpe:2.3:o:linux:linux_kernel:3.14.11
  • Linux Kernel 3.14.12
    cpe:2.3:o:linux:linux_kernel:3.14.12
  • Linux Kernel 3.14.13
    cpe:2.3:o:linux:linux_kernel:3.14.13
  • Linux Kernel 3.14.14
    cpe:2.3:o:linux:linux_kernel:3.14.14
  • Linux Kernel 3.14.15
    cpe:2.3:o:linux:linux_kernel:3.14.15
  • Linux Kernel 3.14.16
    cpe:2.3:o:linux:linux_kernel:3.14.16
  • Linux Kernel 3.14.17
    cpe:2.3:o:linux:linux_kernel:3.14.17
  • Linux Kernel 3.14.18
    cpe:2.3:o:linux:linux_kernel:3.14.18
  • Linux Kernel 3.14.19
    cpe:2.3:o:linux:linux_kernel:3.14.19
  • Linux Kernel 3.14.20
    cpe:2.3:o:linux:linux_kernel:3.14.20
  • Linux Kernel 3.14.21
    cpe:2.3:o:linux:linux_kernel:3.14.21
  • Linux Kernel 3.14.22
    cpe:2.3:o:linux:linux_kernel:3.14.22
  • Linux Kernel 3.14.23
    cpe:2.3:o:linux:linux_kernel:3.14.23
  • Linux Kernel 3.14.24
    cpe:2.3:o:linux:linux_kernel:3.14.24
  • Linux Kernel 3.14.25
    cpe:2.3:o:linux:linux_kernel:3.14.25
  • Linux Kernel 3.14.26
    cpe:2.3:o:linux:linux_kernel:3.14.26
  • Linux Kernel 3.14.27
    cpe:2.3:o:linux:linux_kernel:3.14.27
  • Linux Kernel 3.14.28
    cpe:2.3:o:linux:linux_kernel:3.14.28
  • Linux Kernel 3.14.29
    cpe:2.3:o:linux:linux_kernel:3.14.29
  • Linux Kernel 3.14.30
    cpe:2.3:o:linux:linux_kernel:3.14.30
  • Linux Kernel 3.14.31
    cpe:2.3:o:linux:linux_kernel:3.14.31
  • Linux Kernel 3.14.32
    cpe:2.3:o:linux:linux_kernel:3.14.32
  • Linux Kernel 3.14.33
    cpe:2.3:o:linux:linux_kernel:3.14.33
  • Linux Kernel 3.14.34
    cpe:2.3:o:linux:linux_kernel:3.14.34
  • Linux Kernel 3.14.35
    cpe:2.3:o:linux:linux_kernel:3.14.35
  • Linux Kernel 3.14.36
    cpe:2.3:o:linux:linux_kernel:3.14.36
  • Linux Kernel 3.14.37
    cpe:2.3:o:linux:linux_kernel:3.14.37
  • Linux Kernel 3.14.38
    cpe:2.3:o:linux:linux_kernel:3.14.38
  • Linux Kernel 3.14.39
    cpe:2.3:o:linux:linux_kernel:3.14.39
  • Linux Kernel 3.14.40
    cpe:2.3:o:linux:linux_kernel:3.14.40
  • Linux Kernel 3.14.41
    cpe:2.3:o:linux:linux_kernel:3.14.41
  • Linux Kernel 3.14.42
    cpe:2.3:o:linux:linux_kernel:3.14.42
  • Linux Kernel 3.14.43
    cpe:2.3:o:linux:linux_kernel:3.14.43
  • Linux Kernel 3.14.44
    cpe:2.3:o:linux:linux_kernel:3.14.44
  • Linux Kernel 3.14.45
    cpe:2.3:o:linux:linux_kernel:3.14.45
  • Linux Kernel 3.14.46
    cpe:2.3:o:linux:linux_kernel:3.14.46
  • Linux Kernel 3.14.47
    cpe:2.3:o:linux:linux_kernel:3.14.47
  • Linux Kernel 3.14.48
    cpe:2.3:o:linux:linux_kernel:3.14.48
  • Linux Kernel 3.14.49
    cpe:2.3:o:linux:linux_kernel:3.14.49
  • Linux Kernel 3.14.50
    cpe:2.3:o:linux:linux_kernel:3.14.50
  • Linux Kernel 3.14.51
    cpe:2.3:o:linux:linux_kernel:3.14.51
  • Linux Kernel 3.14.52
    cpe:2.3:o:linux:linux_kernel:3.14.52
  • Linux Kernel 3.14.53
    cpe:2.3:o:linux:linux_kernel:3.14.53
  • Linux Kernel 3.14.54
    cpe:2.3:o:linux:linux_kernel:3.14.54
  • Linux Kernel 3.14.55
    cpe:2.3:o:linux:linux_kernel:3.14.55
  • Linux Kernel 3.14.56
    cpe:2.3:o:linux:linux_kernel:3.14.56
  • Linux Kernel 3.14.57
    cpe:2.3:o:linux:linux_kernel:3.14.57
  • Linux Kernel 3.14.58
    cpe:2.3:o:linux:linux_kernel:3.14.58
  • Linux Kernel 3.14.59
    cpe:2.3:o:linux:linux_kernel:3.14.59
  • Linux Kernel 3.14.60
    cpe:2.3:o:linux:linux_kernel:3.14.60
  • Linux Kernel 3.14.61
    cpe:2.3:o:linux:linux_kernel:3.14.61
  • Linux Kernel 3.14.62
    cpe:2.3:o:linux:linux_kernel:3.14.62
  • Linux Kernel 3.14.63
    cpe:2.3:o:linux:linux_kernel:3.14.63
  • Linux Kernel 3.14.64
    cpe:2.3:o:linux:linux_kernel:3.14.64
  • Linux Kernel 3.14.65
    cpe:2.3:o:linux:linux_kernel:3.14.65
  • Linux Kernel 3.14.66
    cpe:2.3:o:linux:linux_kernel:3.14.66
  • Linux Kernel 3.14.67
    cpe:2.3:o:linux:linux_kernel:3.14.67
  • Linux Kernel 3.14.68
    cpe:2.3:o:linux:linux_kernel:3.14.68
  • Linux Kernel 3.14.79
    cpe:2.3:o:linux:linux_kernel:3.14.79
  • Linux Kernel 3.15
    cpe:2.3:o:linux:linux_kernel:3.15
  • Linux Kernel 3.15 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:3.15:rc4
  • Linux Kernel 3.15.1
    cpe:2.3:o:linux:linux_kernel:3.15.1
  • Linux Kernel 3.15.2
    cpe:2.3:o:linux:linux_kernel:3.15.2
  • Linux Kernel 3.15.3
    cpe:2.3:o:linux:linux_kernel:3.15.3
  • Linux Kernel 3.15.4
    cpe:2.3:o:linux:linux_kernel:3.15.4
  • Linux Kernel 3.15.5
    cpe:2.3:o:linux:linux_kernel:3.15.5
  • Linux Kernel 3.15.6
    cpe:2.3:o:linux:linux_kernel:3.15.6
  • Linux Kernel 3.15.7
    cpe:2.3:o:linux:linux_kernel:3.15.7
  • Linux Kernel 3.15.8
    cpe:2.3:o:linux:linux_kernel:3.15.8
  • Linux Kernel 3.15.10
    cpe:2.3:o:linux:linux_kernel:3.15.10
  • Linux Kernel 3.16
    cpe:2.3:o:linux:linux_kernel:3.16
  • Linux Kernel 3.16.0
    cpe:2.3:o:linux:linux_kernel:3.16.0
  • Linux Kernel 3.16.1
    cpe:2.3:o:linux:linux_kernel:3.16.1
  • Linux Kernel 3.16.4
    cpe:2.3:o:linux:linux_kernel:3.16.4
  • Linux Kernel 3.16.5
    cpe:2.3:o:linux:linux_kernel:3.16.5
  • Linux Kernel 3.16.6
    cpe:2.3:o:linux:linux_kernel:3.16.6
  • Linux Kernel 3.16.7
    cpe:2.3:o:linux:linux_kernel:3.16.7
  • Linux Kernel 3.17
    cpe:2.3:o:linux:linux_kernel:3.17
  • Linux Kernel 3.17.3 on ARM64
    cpe:2.3:o:linux:linux_kernel:3.17.3:-:-:-:-:-:arm64
  • Linux Kernel 3.17.5
    cpe:2.3:o:linux:linux_kernel:3.17.5
  • Linux Kernel 3.17.6
    cpe:2.3:o:linux:linux_kernel:3.17.6
  • Linux Kernel 3.17.7
    cpe:2.3:o:linux:linux_kernel:3.17.7
  • Linux Kernel 3.17.8
    cpe:2.3:o:linux:linux_kernel:3.17.8
  • Linux Kernel 3.18
    cpe:2.3:o:linux:linux_kernel:3.18
  • Linux Kernel 3.18.0
    cpe:2.3:o:linux:linux_kernel:3.18.0
  • Linux Kernel 3.18.1
    cpe:2.3:o:linux:linux_kernel:3.18.1
  • Linux Kernel 3.18.2
    cpe:2.3:o:linux:linux_kernel:3.18.2
  • Linux Kernel 3.18.3
    cpe:2.3:o:linux:linux_kernel:3.18.3
  • Linux Kernel 3.18.4
    cpe:2.3:o:linux:linux_kernel:3.18.4
  • Linux Kernel 3.18.5
    cpe:2.3:o:linux:linux_kernel:3.18.5
  • Linux Kernel 3.18.6
    cpe:2.3:o:linux:linux_kernel:3.18.6
  • Linux Kernel 3.18.7
    cpe:2.3:o:linux:linux_kernel:3.18.7
  • Linux Kernel 3.18.8
    cpe:2.3:o:linux:linux_kernel:3.18.8
  • Linux Kernel 3.18.10
    cpe:2.3:o:linux:linux_kernel:3.18.10
  • Linux Kernel 3.18.11
    cpe:2.3:o:linux:linux_kernel:3.18.11
  • Linux Kernel 3.18.12
    cpe:2.3:o:linux:linux_kernel:3.18.12
  • Linux Kernel 3.18.13
    cpe:2.3:o:linux:linux_kernel:3.18.13
  • Linux Kernel 3.18.14
    cpe:2.3:o:linux:linux_kernel:3.18.14
  • Linux Kernel 3.18.15
    cpe:2.3:o:linux:linux_kernel:3.18.15
  • Linux Kernel 3.18.16
    cpe:2.3:o:linux:linux_kernel:3.18.16
  • Linux Kernel 3.18.17
    cpe:2.3:o:linux:linux_kernel:3.18.17
  • Linux Kernel 3.18.18
    cpe:2.3:o:linux:linux_kernel:3.18.18
  • Linux Kernel 3.18.19
    cpe:2.3:o:linux:linux_kernel:3.18.19
  • Linux Kernel 3.18.20
    cpe:2.3:o:linux:linux_kernel:3.18.20
  • Linux Kernel 3.18.21
    cpe:2.3:o:linux:linux_kernel:3.18.21
  • Linux Kernel 3.18.22
    cpe:2.3:o:linux:linux_kernel:3.18.22
  • Linux Kernel 3.18.23
    cpe:2.3:o:linux:linux_kernel:3.18.23
  • Linux Kernel 3.18.24
    cpe:2.3:o:linux:linux_kernel:3.18.24
  • Linux Kernel 3.18.25
    cpe:2.3:o:linux:linux_kernel:3.18.25
  • Linux Kernel 3.18.26
    cpe:2.3:o:linux:linux_kernel:3.18.26
  • Linux Kernel 3.18.27
    cpe:2.3:o:linux:linux_kernel:3.18.27
  • Linux Kernel 3.18.28
    cpe:2.3:o:linux:linux_kernel:3.18.28
  • Linux Kernel 3.18.29
    cpe:2.3:o:linux:linux_kernel:3.18.29
  • Linux Kernel 3.18.30
    cpe:2.3:o:linux:linux_kernel:3.18.30
  • Linux Kernel 3.18.31
    cpe:2.3:o:linux:linux_kernel:3.18.31
  • Linux Kernel 3.18.32
    cpe:2.3:o:linux:linux_kernel:3.18.32
  • Linux Kernel 3.18.33
    cpe:2.3:o:linux:linux_kernel:3.18.33
  • Linux Kernel 3.18.34
    cpe:2.3:o:linux:linux_kernel:3.18.34
  • Linux Kernel 3.18.35
    cpe:2.3:o:linux:linux_kernel:3.18.35
  • Linux Kernel 3.18.36
    cpe:2.3:o:linux:linux_kernel:3.18.36
  • Linux Kernel 3.18.37
    cpe:2.3:o:linux:linux_kernel:3.18.37
  • Linux Kernel 3.18.38
    cpe:2.3:o:linux:linux_kernel:3.18.38
  • Linux Kernel 3.18.39
    cpe:2.3:o:linux:linux_kernel:3.18.39
  • Linux Kernel 3.18.40
    cpe:2.3:o:linux:linux_kernel:3.18.40
  • Linux Kernel 3.18.41
    cpe:2.3:o:linux:linux_kernel:3.18.41
  • Linux Kernel 3.18.42
    cpe:2.3:o:linux:linux_kernel:3.18.42
  • Linux Kernel 3.18.43
    cpe:2.3:o:linux:linux_kernel:3.18.43
  • Linux Kernel 3.18.44
    cpe:2.3:o:linux:linux_kernel:3.18.44
  • Linux Kernel 3.18.45
    cpe:2.3:o:linux:linux_kernel:3.18.45
  • Linux Kernel 3.18.46
    cpe:2.3:o:linux:linux_kernel:3.18.46
  • Linux Kernel 3.18.47
    cpe:2.3:o:linux:linux_kernel:3.18.47
  • Linux Kernel 3.18.48
    cpe:2.3:o:linux:linux_kernel:3.18.48
  • Linux Kernel 3.18.49
    cpe:2.3:o:linux:linux_kernel:3.18.49
  • Linux Kernel 3.18.50
    cpe:2.3:o:linux:linux_kernel:3.18.50
  • Linux Kernel 3.18.51
    cpe:2.3:o:linux:linux_kernel:3.18.51
  • Linux Kernel 3.18.52
    cpe:2.3:o:linux:linux_kernel:3.18.52
  • Linux Kernel 3.18.53
    cpe:2.3:o:linux:linux_kernel:3.18.53
  • Linux Kernel 3.18.54
    cpe:2.3:o:linux:linux_kernel:3.18.54
  • Linux Kernel 3.18.55
    cpe:2.3:o:linux:linux_kernel:3.18.55
  • Linux Kernel 3.18.56
    cpe:2.3:o:linux:linux_kernel:3.18.56
  • Linux Kernel 3.18.57
    cpe:2.3:o:linux:linux_kernel:3.18.57
  • Linux Kernel 3.18.58
    cpe:2.3:o:linux:linux_kernel:3.18.58
  • Linux Kernel 3.18.59
    cpe:2.3:o:linux:linux_kernel:3.18.59
  • Linux Kernel 3.18.60
    cpe:2.3:o:linux:linux_kernel:3.18.60
  • Linux Kernel 3.18.61
    cpe:2.3:o:linux:linux_kernel:3.18.61
  • Linux Kernel 3.18.62
    cpe:2.3:o:linux:linux_kernel:3.18.62
  • Linux Kernel 3.18.63
    cpe:2.3:o:linux:linux_kernel:3.18.63
  • Linux Kernel 3.18.64
    cpe:2.3:o:linux:linux_kernel:3.18.64
  • Linux Kernel 3.18.65
    cpe:2.3:o:linux:linux_kernel:3.18.65
  • Linux Kernel 3.18.66
    cpe:2.3:o:linux:linux_kernel:3.18.66
  • Linux Kernel 3.19
    cpe:2.3:o:linux:linux_kernel:3.19
  • Linux Kernel 3.19.1
    cpe:2.3:o:linux:linux_kernel:3.19.1
  • Linux Kernel 3.19.2
    cpe:2.3:o:linux:linux_kernel:3.19.2
  • Linux Kernel 3.19.3
    cpe:2.3:o:linux:linux_kernel:3.19.3
  • Linux Kernel 3.19.4
    cpe:2.3:o:linux:linux_kernel:3.19.4
  • Linux Kernel 3.19.5
    cpe:2.3:o:linux:linux_kernel:3.19.5
  • Linux Kernel 3.19.6
    cpe:2.3:o:linux:linux_kernel:3.19.6
  • Linux Kernel 3.19.7
    cpe:2.3:o:linux:linux_kernel:3.19.7
  • Linux Kernel 3.19.8
    cpe:2.3:o:linux:linux_kernel:3.19.8
  • Linux Kernel 4
    cpe:2.3:o:linux:linux_kernel:4
  • Linux Kernel 4.0
    cpe:2.3:o:linux:linux_kernel:4.0
  • Linux Kernel 4.0.0
    cpe:2.3:o:linux:linux_kernel:4.0.0
  • Linux Kernel 4.0.1
    cpe:2.3:o:linux:linux_kernel:4.0.1
  • Linux Kernel 4.0.2
    cpe:2.3:o:linux:linux_kernel:4.0.2
  • Linux Kernel 4.0.3
    cpe:2.3:o:linux:linux_kernel:4.0.3
  • Linux Kernel 4.0.4
    cpe:2.3:o:linux:linux_kernel:4.0.4
  • Linux Kernel 4.0.5
    cpe:2.3:o:linux:linux_kernel:4.0.5
  • Linux Kernel 4.0.6
    cpe:2.3:o:linux:linux_kernel:4.0.6
  • Linux Kernel 4.0.7
    cpe:2.3:o:linux:linux_kernel:4.0.7
  • Linux Kernel 4.0.8
    cpe:2.3:o:linux:linux_kernel:4.0.8
  • Linux Kernel 4.0.9
    cpe:2.3:o:linux:linux_kernel:4.0.9
  • Linux Kernel 4.1
    cpe:2.3:o:linux:linux_kernel:4.1
  • Linux Kernel 4.1.0
    cpe:2.3:o:linux:linux_kernel:4.1.0
  • Linux Kernel 4.1.1
    cpe:2.3:o:linux:linux_kernel:4.1.1
  • Linux Kernel 4.1.2
    cpe:2.3:o:linux:linux_kernel:4.1.2
  • Linux Kernel 4.1.3
    cpe:2.3:o:linux:linux_kernel:4.1.3
  • Linux Kernel 4.1.4
    cpe:2.3:o:linux:linux_kernel:4.1.4
  • Linux Kernel 4.1.5
    cpe:2.3:o:linux:linux_kernel:4.1.5
  • Linux Kernel 4.1.6
    cpe:2.3:o:linux:linux_kernel:4.1.6
  • Linux Kernel 4.1.7
    cpe:2.3:o:linux:linux_kernel:4.1.7
  • Linux Kernel 4.1.8
    cpe:2.3:o:linux:linux_kernel:4.1.8
  • Linux Kernel 4.1.9
    cpe:2.3:o:linux:linux_kernel:4.1.9
  • Linux Kernel 4.1.10
    cpe:2.3:o:linux:linux_kernel:4.1.10
  • Linux Kernel 4.1.11
    cpe:2.3:o:linux:linux_kernel:4.1.11
  • Linux Kernel 4.1.12
    cpe:2.3:o:linux:linux_kernel:4.1.12
  • Linux Kernel 4.1.13
    cpe:2.3:o:linux:linux_kernel:4.1.13
  • Linux Kernel 4.1.14
    cpe:2.3:o:linux:linux_kernel:4.1.14
  • Linux Kernel 4.1.15
    cpe:2.3:o:linux:linux_kernel:4.1.15
  • Linux Kernel 4.1.16
    cpe:2.3:o:linux:linux_kernel:4.1.16
  • Linux Kernel 4.1.17
    cpe:2.3:o:linux:linux_kernel:4.1.17
  • Linux Kernel 4.1.18
    cpe:2.3:o:linux:linux_kernel:4.1.18
  • Linux Kernel 4.1.19
    cpe:2.3:o:linux:linux_kernel:4.1.19
  • Linux Kernel 4.1.20
    cpe:2.3:o:linux:linux_kernel:4.1.20
  • Linux Kernel 4.1.21
    cpe:2.3:o:linux:linux_kernel:4.1.21
  • Linux Kernel 4.1.22
    cpe:2.3:o:linux:linux_kernel:4.1.22
  • Linux Kernel 4.1.23
    cpe:2.3:o:linux:linux_kernel:4.1.23
  • Linux Kernel 4.1.24
    cpe:2.3:o:linux:linux_kernel:4.1.24
  • Linux Kernel 4.1.25
    cpe:2.3:o:linux:linux_kernel:4.1.25
  • Linux Kernel 4.1.26
    cpe:2.3:o:linux:linux_kernel:4.1.26
  • Linux Kernel 4.1.27
    cpe:2.3:o:linux:linux_kernel:4.1.27
  • Linux Kernel 4.1.28
    cpe:2.3:o:linux:linux_kernel:4.1.28
  • Linux Kernel 4.1.29
    cpe:2.3:o:linux:linux_kernel:4.1.29
  • Linux Kernel 4.1.30
    cpe:2.3:o:linux:linux_kernel:4.1.30
  • Linux Kernel 4.1.31
    cpe:2.3:o:linux:linux_kernel:4.1.31
  • Linux Kernel 4.1.32
    cpe:2.3:o:linux:linux_kernel:4.1.32
  • Linux Kernel 4.1.33
    cpe:2.3:o:linux:linux_kernel:4.1.33
  • Linux Kernel 4.1.34
    cpe:2.3:o:linux:linux_kernel:4.1.34
  • Linux Kernel 4.1.35
    cpe:2.3:o:linux:linux_kernel:4.1.35
  • Linux Kernel 4.1.36
    cpe:2.3:o:linux:linux_kernel:4.1.36
  • Linux Kernel 4.1.37
    cpe:2.3:o:linux:linux_kernel:4.1.37
  • Linux Kernel 4.1.38
    cpe:2.3:o:linux:linux_kernel:4.1.38
  • Linux Kernel 4.1.39
    cpe:2.3:o:linux:linux_kernel:4.1.39
  • Linux Kernel 4.1.40
    cpe:2.3:o:linux:linux_kernel:4.1.40
  • Linux Kernel 4.1.41
    cpe:2.3:o:linux:linux_kernel:4.1.41
  • Linux Kernel 4.1.42
    cpe:2.3:o:linux:linux_kernel:4.1.42
  • Linux Kernel 4.1.43
    cpe:2.3:o:linux:linux_kernel:4.1.43
  • Linux Kernel 4.1.44
    cpe:2.3:o:linux:linux_kernel:4.1.44
  • Linux Kernel 4.1.45
    cpe:2.3:o:linux:linux_kernel:4.1.45
  • Linux Kernel 4.1.46
    cpe:2.3:o:linux:linux_kernel:4.1.46
  • Linux Kernel 4.1.47
    cpe:2.3:o:linux:linux_kernel:4.1.47
  • Linux Kernel 4.1.48
    cpe:2.3:o:linux:linux_kernel:4.1.48
  • Linux Kernel 4.1.49
    cpe:2.3:o:linux:linux_kernel:4.1.49
  • Linux Kernel 4.1.50
    cpe:2.3:o:linux:linux_kernel:4.1.50
  • Linux Kernel 4.1.51
    cpe:2.3:o:linux:linux_kernel:4.1.51
  • Linux Kernel 4.2
    cpe:2.3:o:linux:linux_kernel:4.2
  • Linux Kernel 4.2.0
    cpe:2.3:o:linux:linux_kernel:4.2.0
  • Linux Kernel 4.2.1
    cpe:2.3:o:linux:linux_kernel:4.2.1
  • Linux Kernel 4.2.2
    cpe:2.3:o:linux:linux_kernel:4.2.2
  • Linux Kernel 4.2.3
    cpe:2.3:o:linux:linux_kernel:4.2.3
  • Linux Kernel 4.2.4
    cpe:2.3:o:linux:linux_kernel:4.2.4
  • Linux Kernel 4.2.5
    cpe:2.3:o:linux:linux_kernel:4.2.5
  • Linux Kernel 4.2.6
    cpe:2.3:o:linux:linux_kernel:4.2.6
  • Linux Kernel 4.2.7
    cpe:2.3:o:linux:linux_kernel:4.2.7
  • Linux Kernel 4.2.8
    cpe:2.3:o:linux:linux_kernel:4.2.8
  • Linux Kernel 4.3
    cpe:2.3:o:linux:linux_kernel:4.3
  • Linux Kernel 4.3 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:4.3:rc1
  • Linux Kernel 4.3 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:4.3:rc7
  • Linux Kernel 4.3.0
    cpe:2.3:o:linux:linux_kernel:4.3.0
  • Linux Kernel 4.3.1
    cpe:2.3:o:linux:linux_kernel:4.3.1
  • Linux Kernel 4.3.2
    cpe:2.3:o:linux:linux_kernel:4.3.2
  • Linux Kernel 4.3.3
    cpe:2.3:o:linux:linux_kernel:4.3.3
  • Linux Kernel 4.3.4
    cpe:2.3:o:linux:linux_kernel:4.3.4
  • Linux Kernel 4.3.5
    cpe:2.3:o:linux:linux_kernel:4.3.5
  • Linux Kernel 4.3.6
    cpe:2.3:o:linux:linux_kernel:4.3.6
  • Linux Kernel 4.4
    cpe:2.3:o:linux:linux_kernel:4.4
  • Linux Kernel 4.4 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:4.4:rc8
  • Linux Kernel 4.4.0
    cpe:2.3:o:linux:linux_kernel:4.4.0
  • Linux Kernel 4.4.1
    cpe:2.3:o:linux:linux_kernel:4.4.1
  • Linux Kernel 4.4.2
    cpe:2.3:o:linux:linux_kernel:4.4.2
  • Linux Kernel 4.4.3
    cpe:2.3:o:linux:linux_kernel:4.4.3
  • Linux Kernel 4.4.4
    cpe:2.3:o:linux:linux_kernel:4.4.4
  • Linux Kernel 4.4.5
    cpe:2.3:o:linux:linux_kernel:4.4.5
  • Linux Kernel 4.4.6
    cpe:2.3:o:linux:linux_kernel:4.4.6
  • Linux Kernel 4.4.7
    cpe:2.3:o:linux:linux_kernel:4.4.7
  • Linux Kernel 4.4.8
    cpe:2.3:o:linux:linux_kernel:4.4.8
  • Linux Kernel 4.4.9
    cpe:2.3:o:linux:linux_kernel:4.4.9
  • Linux Kernel 4.4.10
    cpe:2.3:o:linux:linux_kernel:4.4.10
  • Linux Kernel 4.4.11
    cpe:2.3:o:linux:linux_kernel:4.4.11
  • Linux Kernel 4.4.12
    cpe:2.3:o:linux:linux_kernel:4.4.12
  • Linux Kernel 4.4.13
    cpe:2.3:o:linux:linux_kernel:4.4.13
  • Linux Kernel 4.4.14
    cpe:2.3:o:linux:linux_kernel:4.4.14
  • Linux Kernel 4.4.15
    cpe:2.3:o:linux:linux_kernel:4.4.15
  • Linux Kernel 4.4.16
    cpe:2.3:o:linux:linux_kernel:4.4.16
  • Linux Kernel 4.4.17
    cpe:2.3:o:linux:linux_kernel:4.4.17
  • Linux Kernel 4.4.18
    cpe:2.3:o:linux:linux_kernel:4.4.18
  • Linux Kernel 4.4.19
    cpe:2.3:o:linux:linux_kernel:4.4.19
  • Linux Kernel 4.4.20
    cpe:2.3:o:linux:linux_kernel:4.4.20
  • Linux Kernel 4.4.21
    cpe:2.3:o:linux:linux_kernel:4.4.21
  • Linux Kernel 4.4.22
    cpe:2.3:o:linux:linux_kernel:4.4.22
  • Linux Kernel 4.4.23
    cpe:2.3:o:linux:linux_kernel:4.4.23
  • Linux Kernel 4.4.24
    cpe:2.3:o:linux:linux_kernel:4.4.24
  • Linux Kernel 4.4.25
    cpe:2.3:o:linux:linux_kernel:4.4.25
  • Linux Kernel 4.4.26
    cpe:2.3:o:linux:linux_kernel:4.4.26
  • Linux Kernel 4.4.27
    cpe:2.3:o:linux:linux_kernel:4.4.27
  • Linux Kernel 4.4.28
    cpe:2.3:o:linux:linux_kernel:4.4.28
  • Linux Kernel 4.4.29
    cpe:2.3:o:linux:linux_kernel:4.4.29
  • Linux Kernel 4.4.30
    cpe:2.3:o:linux:linux_kernel:4.4.30
  • Linux Kernel 4.4.31
    cpe:2.3:o:linux:linux_kernel:4.4.31
  • Linux Kernel 4.4.32
    cpe:2.3:o:linux:linux_kernel:4.4.32
  • Linux Kernel 4.4.33
    cpe:2.3:o:linux:linux_kernel:4.4.33
  • Linux Kernel 4.4.34
    cpe:2.3:o:linux:linux_kernel:4.4.34
  • Linux Kernel 4.4.35
    cpe:2.3:o:linux:linux_kernel:4.4.35
  • Linux Kernel 4.4.36
    cpe:2.3:o:linux:linux_kernel:4.4.36
  • Linux Kernel 4.4.37
    cpe:2.3:o:linux:linux_kernel:4.4.37
  • Linux Kernel 4.4.38
    cpe:2.3:o:linux:linux_kernel:4.4.38
  • Linux Kernel 4.4.39
    cpe:2.3:o:linux:linux_kernel:4.4.39
  • Linux Kernel 4.4.40
    cpe:2.3:o:linux:linux_kernel:4.4.40
  • Linux Kernel 4.4.41
    cpe:2.3:o:linux:linux_kernel:4.4.41
  • Linux Kernel 4.4.42
    cpe:2.3:o:linux:linux_kernel:4.4.42
  • Linux Kernel 4.4.43
    cpe:2.3:o:linux:linux_kernel:4.4.43
  • Linux Kernel 4.4.44
    cpe:2.3:o:linux:linux_kernel:4.4.44
  • Linux Kernel 4.4.45
    cpe:2.3:o:linux:linux_kernel:4.4.45
  • Linux Kernel 4.4.46
    cpe:2.3:o:linux:linux_kernel:4.4.46
  • Linux Kernel 4.4.47
    cpe:2.3:o:linux:linux_kernel:4.4.47
  • Linux Kernel 4.4.48
    cpe:2.3:o:linux:linux_kernel:4.4.48
  • Linux Kernel 4.4.49
    cpe:2.3:o:linux:linux_kernel:4.4.49
  • Linux Kernel 4.4.50
    cpe:2.3:o:linux:linux_kernel:4.4.50
  • Linux Kernel 4.4.51
    cpe:2.3:o:linux:linux_kernel:4.4.51
  • Linux Kernel 4.4.52
    cpe:2.3:o:linux:linux_kernel:4.4.52
  • Linux Kernel 4.4.53
    cpe:2.3:o:linux:linux_kernel:4.4.53
  • Linux Kernel 4.4.54
    cpe:2.3:o:linux:linux_kernel:4.4.54
  • Linux Kernel 4.4.55
    cpe:2.3:o:linux:linux_kernel:4.4.55
  • Linux Kernel 4.4.56
    cpe:2.3:o:linux:linux_kernel:4.4.56
  • Linux Kernel 4.4.57
    cpe:2.3:o:linux:linux_kernel:4.4.57
  • Linux Kernel 4.4.58
    cpe:2.3:o:linux:linux_kernel:4.4.58
  • Linux Kernel 4.4.59
    cpe:2.3:o:linux:linux_kernel:4.4.59
  • Linux Kernel 4.4.60
    cpe:2.3:o:linux:linux_kernel:4.4.60
  • Linux Kernel 4.4.61
    cpe:2.3:o:linux:linux_kernel:4.4.61
  • Linux Kernel 4.4.62
    cpe:2.3:o:linux:linux_kernel:4.4.62
  • Linux Kernel 4.4.63
    cpe:2.3:o:linux:linux_kernel:4.4.63
  • Linux Kernel 4.4.64
    cpe:2.3:o:linux:linux_kernel:4.4.64
  • Linux Kernel 4.4.65
    cpe:2.3:o:linux:linux_kernel:4.4.65
  • Linux Kernel 4.4.66
    cpe:2.3:o:linux:linux_kernel:4.4.66
  • Linux Kernel 4.4.67
    cpe:2.3:o:linux:linux_kernel:4.4.67
  • Linux Kernel 4.4.68
    cpe:2.3:o:linux:linux_kernel:4.4.68
  • Linux Kernel 4.4.69
    cpe:2.3:o:linux:linux_kernel:4.4.69
  • Linux Kernel 4.4.70
    cpe:2.3:o:linux:linux_kernel:4.4.70
  • Linux Kernel 4.4.71
    cpe:2.3:o:linux:linux_kernel:4.4.71
  • Linux Kernel 4.4.72
    cpe:2.3:o:linux:linux_kernel:4.4.72
  • Linux Kernel 4.4.73
    cpe:2.3:o:linux:linux_kernel:4.4.73
  • Linux Kernel 4.4.74
    cpe:2.3:o:linux:linux_kernel:4.4.74
  • Linux Kernel 4.4.75
    cpe:2.3:o:linux:linux_kernel:4.4.75
  • Linux Kernel 4.4.76
    cpe:2.3:o:linux:linux_kernel:4.4.76
  • Linux Kernel 4.4.77
    cpe:2.3:o:linux:linux_kernel:4.4.77
  • Linux Kernel 4.4.78
    cpe:2.3:o:linux:linux_kernel:4.4.78
  • Linux Kernel 4.4.79
    cpe:2.3:o:linux:linux_kernel:4.4.79
  • Linux Kernel 4.4.80
    cpe:2.3:o:linux:linux_kernel:4.4.80
  • Linux Kernel 4.4.81
    cpe:2.3:o:linux:linux_kernel:4.4.81
  • Linux Kernel 4.4.82
    cpe:2.3:o:linux:linux_kernel:4.4.82
  • Linux Kernel 4.4.83
    cpe:2.3:o:linux:linux_kernel:4.4.83
  • Linux Kernel 4.4.84
    cpe:2.3:o:linux:linux_kernel:4.4.84
  • Linux Kernel 4.4.85
    cpe:2.3:o:linux:linux_kernel:4.4.85
  • Linux Kernel 4.4.86
    cpe:2.3:o:linux:linux_kernel:4.4.86
  • Linux Kernel 4.4.87
    cpe:2.3:o:linux:linux_kernel:4.4.87
  • Linux Kernel 4.4.88
    cpe:2.3:o:linux:linux_kernel:4.4.88
  • Linux Kernel 4.4.89
    cpe:2.3:o:linux:linux_kernel:4.4.89
  • Linux Kernel 4.4.90
    cpe:2.3:o:linux:linux_kernel:4.4.90
  • Linux Kernel 4.4.91
    cpe:2.3:o:linux:linux_kernel:4.4.91
  • Linux Kernel 4.4.92
    cpe:2.3:o:linux:linux_kernel:4.4.92
  • Linux Kernel 4.4.93
    cpe:2.3:o:linux:linux_kernel:4.4.93
  • Linux Kernel 4.4.94
    cpe:2.3:o:linux:linux_kernel:4.4.94
  • Linux Kernel 4.4.95
    cpe:2.3:o:linux:linux_kernel:4.4.95
  • Linux Kernel 4.4.96
    cpe:2.3:o:linux:linux_kernel:4.4.96
  • Linux Kernel 4.4.97
    cpe:2.3:o:linux:linux_kernel:4.4.97
  • Linux Kernel 4.4.98
    cpe:2.3:o:linux:linux_kernel:4.4.98
  • Linux Kernel 4.4.99
    cpe:2.3:o:linux:linux_kernel:4.4.99
  • Linux Kernel 4.4.100
    cpe:2.3:o:linux:linux_kernel:4.4.100
  • Linux Kernel 4.4.101
    cpe:2.3:o:linux:linux_kernel:4.4.101
  • Linux Kernel 4.4.102
    cpe:2.3:o:linux:linux_kernel:4.4.102
  • Linux Kernel 4.4.103
    cpe:2.3:o:linux:linux_kernel:4.4.103
  • Linux Kernel 4.4.104
    cpe:2.3:o:linux:linux_kernel:4.4.104
  • Linux Kernel 4.4.105
    cpe:2.3:o:linux:linux_kernel:4.4.105
  • Linux Kernel 4.4.106
    cpe:2.3:o:linux:linux_kernel:4.4.106
  • Linux Kernel 4.4.107
    cpe:2.3:o:linux:linux_kernel:4.4.107
  • Linux Kernel 4.4.108
    cpe:2.3:o:linux:linux_kernel:4.4.108
  • Linux Kernel 4.4.109
    cpe:2.3:o:linux:linux_kernel:4.4.109
  • Linux Kernel 4.4.110
    cpe:2.3:o:linux:linux_kernel:4.4.110
  • Linux Kernel 4.4.111
    cpe:2.3:o:linux:linux_kernel:4.4.111
  • Linux Kernel 4.4.112
    cpe:2.3:o:linux:linux_kernel:4.4.112
  • Linux Kernel 4.4.113
    cpe:2.3:o:linux:linux_kernel:4.4.113
  • Linux Kernel 4.4.114
    cpe:2.3:o:linux:linux_kernel:4.4.114
  • Linux Kernel 4.4.115
    cpe:2.3:o:linux:linux_kernel:4.4.115
  • Linux Kernel 4.4.116
    cpe:2.3:o:linux:linux_kernel:4.4.116
  • Linux Kernel 4.4.117
    cpe:2.3:o:linux:linux_kernel:4.4.117
  • Linux Kernel 4.4.118
    cpe:2.3:o:linux:linux_kernel:4.4.118
  • Linux Kernel 4.4.119
    cpe:2.3:o:linux:linux_kernel:4.4.119
  • Linux Kernel 4.4.120
    cpe:2.3:o:linux:linux_kernel:4.4.120
  • Linux Kernel 4.4.121
    cpe:2.3:o:linux:linux_kernel:4.4.121
  • Linux Kernel 4.4.122
    cpe:2.3:o:linux:linux_kernel:4.4.122
  • Linux Kernel 4.4.123
    cpe:2.3:o:linux:linux_kernel:4.4.123
  • Linux Kernel 4.4.124
    cpe:2.3:o:linux:linux_kernel:4.4.124
  • Linux Kernel 4.4.125
    cpe:2.3:o:linux:linux_kernel:4.4.125
  • Linux Kernel 4.4.126
    cpe:2.3:o:linux:linux_kernel:4.4.126
  • Linux Kernel 4.4.127
    cpe:2.3:o:linux:linux_kernel:4.4.127
  • Linux Kernel 4.4.128
    cpe:2.3:o:linux:linux_kernel:4.4.128
  • Linux Kernel 4.5
    cpe:2.3:o:linux:linux_kernel:4.5
  • Linux Kernel 4.5.0
    cpe:2.3:o:linux:linux_kernel:4.5.0
  • Linux Kernel 4.5.0 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:4.5.0:rc7
  • Linux Kernel 4.5.1
    cpe:2.3:o:linux:linux_kernel:4.5.1
  • Linux Kernel 4.5.2
    cpe:2.3:o:linux:linux_kernel:4.5.2
  • Linux Kernel 4.5.3
    cpe:2.3:o:linux:linux_kernel:4.5.3
  • Linux Kernel 4.5.4
    cpe:2.3:o:linux:linux_kernel:4.5.4
  • Linux Kernel 4.5.5
    cpe:2.3:o:linux:linux_kernel:4.5.5
  • Linux Kernel 4.5.6
    cpe:2.3:o:linux:linux_kernel:4.5.6
  • Linux Kernel 4.5.7
    cpe:2.3:o:linux:linux_kernel:4.5.7
  • Linux Kernel 4.6
    cpe:2.3:o:linux:linux_kernel:4.6
  • Linux Kernel 4.6.1
    cpe:2.3:o:linux:linux_kernel:4.6.1
  • Linux Kernel 4.6.2
    cpe:2.3:o:linux:linux_kernel:4.6.2
  • Linux Kernel 4.6.3
    cpe:2.3:o:linux:linux_kernel:4.6.3
  • Linux Kernel 4.6.4
    cpe:2.3:o:linux:linux_kernel:4.6.4
  • Linux Kernel 4.6.5
    cpe:2.3:o:linux:linux_kernel:4.6.5
  • Linux Kernel 4.6.6
    cpe:2.3:o:linux:linux_kernel:4.6.6
  • Linux Kernel 4.6.7
    cpe:2.3:o:linux:linux_kernel:4.6.7
  • Linux Kernel 4.7
    cpe:2.3:o:linux:linux_kernel:4.7
  • Linux Kernel 4.7 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:4.7:rc6
  • Linux Kernel 4.7.1
    cpe:2.3:o:linux:linux_kernel:4.7.1
  • Linux Kernel 4.7.2
    cpe:2.3:o:linux:linux_kernel:4.7.2
  • Linux Kernel 4.7.3
    cpe:2.3:o:linux:linux_kernel:4.7.3
  • Linux Kernel 4.7.4
    cpe:2.3:o:linux:linux_kernel:4.7.4
  • Linux Kernel 4.7.5
    cpe:2.3:o:linux:linux_kernel:4.7.5
  • Linux Kernel 4.7.6
    cpe:2.3:o:linux:linux_kernel:4.7.6
  • Linux Kernel 4.7.7
    cpe:2.3:o:linux:linux_kernel:4.7.7
  • Linux Kernel 4.7.8
    cpe:2.3:o:linux:linux_kernel:4.7.8
  • Linux Kernel 4.7.9
    cpe:2.3:o:linux:linux_kernel:4.7.9
  • Linux Kernel 4.7.10
    cpe:2.3:o:linux:linux_kernel:4.7.10
  • Linux Kernel 4.8
    cpe:2.3:o:linux:linux_kernel:4.8
  • Linux Kernel 4.8.1
    cpe:2.3:o:linux:linux_kernel:4.8.1
  • Linux Kernel 4.8.2
    cpe:2.3:o:linux:linux_kernel:4.8.2
  • Linux Kernel 4.8.3
    cpe:2.3:o:linux:linux_kernel:4.8.3
  • Linux Kernel 4.8.4
    cpe:2.3:o:linux:linux_kernel:4.8.4
  • Linux Kernel 4.8.5
    cpe:2.3:o:linux:linux_kernel:4.8.5
  • Linux Kernel 4.8.6
    cpe:2.3:o:linux:linux_kernel:4.8.6
  • Linux Kernel 4.8.7
    cpe:2.3:o:linux:linux_kernel:4.8.7
  • Linux Kernel 4.8.8
    cpe:2.3:o:linux:linux_kernel:4.8.8
  • Linux Kernel 4.8.9
    cpe:2.3:o:linux:linux_kernel:4.8.9
  • Linux Kernel 4.8.10
    cpe:2.3:o:linux:linux_kernel:4.8.10
  • Linux Kernel 4.8.11
    cpe:2.3:o:linux:linux_kernel:4.8.11
  • Linux Kernel 4.8.12
    cpe:2.3:o:linux:linux_kernel:4.8.12
  • Linux Kernel 4.8.13
    cpe:2.3:o:linux:linux_kernel:4.8.13
  • Linux Kernel 4.8.14
    cpe:2.3:o:linux:linux_kernel:4.8.14
  • Linux Kernel 4.8.15
    cpe:2.3:o:linux:linux_kernel:4.8.15
  • Linux Kernel 4.8.16
    cpe:2.3:o:linux:linux_kernel:4.8.16
  • Linux Kernel 4.8.17
    cpe:2.3:o:linux:linux_kernel:4.8.17
  • Linux Kernel 4.9
    cpe:2.3:o:linux:linux_kernel:4.9
  • Linux Kernel 4.9.1
    cpe:2.3:o:linux:linux_kernel:4.9.1
  • Linux Kernel 4.9.2
    cpe:2.3:o:linux:linux_kernel:4.9.2
  • Linux Kernel 4.9.3
    cpe:2.3:o:linux:linux_kernel:4.9.3
  • Linux Kernel 4.9.4
    cpe:2.3:o:linux:linux_kernel:4.9.4
  • Linux Kernel 4.9.5
    cpe:2.3:o:linux:linux_kernel:4.9.5
  • Linux Kernel 4.9.6
    cpe:2.3:o:linux:linux_kernel:4.9.6
  • Linux Kernel 4.9.7
    cpe:2.3:o:linux:linux_kernel:4.9.7
  • Linux Kernel 4.9.8
    cpe:2.3:o:linux:linux_kernel:4.9.8
  • Linux Kernel 4.9.9
    cpe:2.3:o:linux:linux_kernel:4.9.9
  • Linux Kernel 4.9.10
    cpe:2.3:o:linux:linux_kernel:4.9.10
  • Linux Kernel 4.9.11
    cpe:2.3:o:linux:linux_kernel:4.9.11
  • Linux Kernel 4.9.12
    cpe:2.3:o:linux:linux_kernel:4.9.12
  • Linux Kernel 4.9.13
    cpe:2.3:o:linux:linux_kernel:4.9.13
  • Linux Kernel 4.9.14
    cpe:2.3:o:linux:linux_kernel:4.9.14
  • Linux Kernel 4.9.15
    cpe:2.3:o:linux:linux_kernel:4.9.15
  • Linux Kernel 4.9.16
    cpe:2.3:o:linux:linux_kernel:4.9.16
  • Linux Kernel 4.9.17
    cpe:2.3:o:linux:linux_kernel:4.9.17
  • Linux Kernel 4.9.18
    cpe:2.3:o:linux:linux_kernel:4.9.18
  • Linux Kernel 4.9.19
    cpe:2.3:o:linux:linux_kernel:4.9.19
  • Linux Kernel 4.9.20
    cpe:2.3:o:linux:linux_kernel:4.9.20
  • Linux Kernel 4.9.21
    cpe:2.3:o:linux:linux_kernel:4.9.21
  • Linux Kernel 4.9.22
    cpe:2.3:o:linux:linux_kernel:4.9.22
  • Linux Kernel 4.9.23
    cpe:2.3:o:linux:linux_kernel:4.9.23
  • Linux Kernel 4.9.24
    cpe:2.3:o:linux:linux_kernel:4.9.24
  • Linux Kernel 4.9.25
    cpe:2.3:o:linux:linux_kernel:4.9.25
  • Linux Kernel 4.9.26
    cpe:2.3:o:linux:linux_kernel:4.9.26
  • Linux Kernel 4.9.27
    cpe:2.3:o:linux:linux_kernel:4.9.27
  • Linux Kernel 4.9.28
    cpe:2.3:o:linux:linux_kernel:4.9.28
  • Linux Kernel 4.9.29
    cpe:2.3:o:linux:linux_kernel:4.9.29
  • Linux Kernel 4.9.30
    cpe:2.3:o:linux:linux_kernel:4.9.30
  • Linux Kernel 4.9.31
    cpe:2.3:o:linux:linux_kernel:4.9.31
  • Linux Kernel 4.9.32
    cpe:2.3:o:linux:linux_kernel:4.9.32
  • Linux Kernel 4.9.33
    cpe:2.3:o:linux:linux_kernel:4.9.33
  • Linux Kernel 4.9.34
    cpe:2.3:o:linux:linux_kernel:4.9.34
  • Linux Kernel 4.9.35
    cpe:2.3:o:linux:linux_kernel:4.9.35
  • Linux Kernel 4.9.36
    cpe:2.3:o:linux:linux_kernel:4.9.36
  • Linux Kernel 4.9.37
    cpe:2.3:o:linux:linux_kernel:4.9.37
  • Linux Kernel 4.9.38
    cpe:2.3:o:linux:linux_kernel:4.9.38
  • Linux Kernel 4.9.39
    cpe:2.3:o:linux:linux_kernel:4.9.39
  • Linux Kernel 4.9.40
    cpe:2.3:o:linux:linux_kernel:4.9.40
  • Linux Kernel 4.9.41
    cpe:2.3:o:linux:linux_kernel:4.9.41
  • Linux Kernel 4.9.42
    cpe:2.3:o:linux:linux_kernel:4.9.42
  • Linux Kernel 4.9.43
    cpe:2.3:o:linux:linux_kernel:4.9.43
  • Linux Kernel 4.9.44
    cpe:2.3:o:linux:linux_kernel:4.9.44
  • Linux Kernel 4.9.45
    cpe:2.3:o:linux:linux_kernel:4.9.45
  • Linux Kernel 4.9.46
    cpe:2.3:o:linux:linux_kernel:4.9.46
  • Linux Kernel 4.9.47
    cpe:2.3:o:linux:linux_kernel:4.9.47
  • Linux Kernel 4.9.48
    cpe:2.3:o:linux:linux_kernel:4.9.48
  • Linux Kernel 4.9.49
    cpe:2.3:o:linux:linux_kernel:4.9.49
  • Linux Kernel 4.9.50
    cpe:2.3:o:linux:linux_kernel:4.9.50
  • Linux Kernel 4.9.51
    cpe:2.3:o:linux:linux_kernel:4.9.51
  • Linux Kernel 4.9.52
    cpe:2.3:o:linux:linux_kernel:4.9.52
  • Linux Kernel 4.9.53
    cpe:2.3:o:linux:linux_kernel:4.9.53
  • Linux Kernel 4.9.54
    cpe:2.3:o:linux:linux_kernel:4.9.54
  • Linux Kernel 4.9.55
    cpe:2.3:o:linux:linux_kernel:4.9.55
  • Linux Kernel 4.9.56
    cpe:2.3:o:linux:linux_kernel:4.9.56
  • Linux Kernel 4.9.57
    cpe:2.3:o:linux:linux_kernel:4.9.57
  • Linux Kernel 4.9.58
    cpe:2.3:o:linux:linux_kernel:4.9.58
  • Linux Kernel 4.9.59
    cpe:2.3:o:linux:linux_kernel:4.9.59
  • Linux Kernel 4.9.60
    cpe:2.3:o:linux:linux_kernel:4.9.60
  • Linux Kernel 4.9.61
    cpe:2.3:o:linux:linux_kernel:4.9.61
  • Linux Kernel 4.9.62
    cpe:2.3:o:linux:linux_kernel:4.9.62
  • Linux Kernel 4.9.63
    cpe:2.3:o:linux:linux_kernel:4.9.63
  • Linux Kernel 4.9.64
    cpe:2.3:o:linux:linux_kernel:4.9.64
  • Linux Kernel 4.9.65
    cpe:2.3:o:linux:linux_kernel:4.9.65
  • Linux Kernel 4.9.66
    cpe:2.3:o:linux:linux_kernel:4.9.66
  • Linux Kernel 4.9.67
    cpe:2.3:o:linux:linux_kernel:4.9.67
  • Linux Kernel 4.9.68
    cpe:2.3:o:linux:linux_kernel:4.9.68
  • Linux Kernel 4.9.69
    cpe:2.3:o:linux:linux_kernel:4.9.69
  • Linux Kernel 4.9.70
    cpe:2.3:o:linux:linux_kernel:4.9.70
  • Linux Kernel 4.9.71
    cpe:2.3:o:linux:linux_kernel:4.9.71
  • Linux Kernel 4.9.72
    cpe:2.3:o:linux:linux_kernel:4.9.72
  • Linux Kernel 4.9.73
    cpe:2.3:o:linux:linux_kernel:4.9.73
  • Linux Kernel 4.9.74
    cpe:2.3:o:linux:linux_kernel:4.9.74
  • Linux Kernel 4.9.75
    cpe:2.3:o:linux:linux_kernel:4.9.75
  • Linux Kernel 4.9.76
    cpe:2.3:o:linux:linux_kernel:4.9.76
  • Linux Kernel 4.9.77
    cpe:2.3:o:linux:linux_kernel:4.9.77
  • Linux Kernel 4.9.78
    cpe:2.3:o:linux:linux_kernel:4.9.78
  • Linux Kernel 4.9.79
    cpe:2.3:o:linux:linux_kernel:4.9.79
  • Linux Kernel 4.9.80
    cpe:2.3:o:linux:linux_kernel:4.9.80
  • Linux Kernel 4.9.81
    cpe:2.3:o:linux:linux_kernel:4.9.81
  • Linux Kernel 4.9.82
    cpe:2.3:o:linux:linux_kernel:4.9.82
  • Linux Kernel 4.9.83
    cpe:2.3:o:linux:linux_kernel:4.9.83
  • Linux Kernel 4.9.84
    cpe:2.3:o:linux:linux_kernel:4.9.84
  • Linux Kernel 4.9.85
    cpe:2.3:o:linux:linux_kernel:4.9.85
  • Linux Kernel 4.9.86
    cpe:2.3:o:linux:linux_kernel:4.9.86
  • Linux Kernel 4.9.87
    cpe:2.3:o:linux:linux_kernel:4.9.87
  • Linux Kernel 4.9.88
    cpe:2.3:o:linux:linux_kernel:4.9.88
  • Linux Kernel 4.9.89
    cpe:2.3:o:linux:linux_kernel:4.9.89
  • Linux Kernel 4.9.90
    cpe:2.3:o:linux:linux_kernel:4.9.90
  • Linux Kernel 4.9.91
    cpe:2.3:o:linux:linux_kernel:4.9.91
  • Linux Kernel 4.9.92
    cpe:2.3:o:linux:linux_kernel:4.9.92
  • Linux Kernel 4.9.93
    cpe:2.3:o:linux:linux_kernel:4.9.93
  • Linux Kernel 4.9.94
    cpe:2.3:o:linux:linux_kernel:4.9.94
  • Linux Kernel 4.9.95
    cpe:2.3:o:linux:linux_kernel:4.9.95
  • Linux Kernel 4.10
    cpe:2.3:o:linux:linux_kernel:4.10
  • Linux Kernel 4.10.1
    cpe:2.3:o:linux:linux_kernel:4.10.1
  • Linux Kernel 4.10.2
    cpe:2.3:o:linux:linux_kernel:4.10.2
  • Linux Kernel 4.10.3
    cpe:2.3:o:linux:linux_kernel:4.10.3
  • Linux Kernel 4.10.4
    cpe:2.3:o:linux:linux_kernel:4.10.4
  • Linux Kernel 4.10.5
    cpe:2.3:o:linux:linux_kernel:4.10.5
  • Linux Kernel 4.10.6
    cpe:2.3:o:linux:linux_kernel:4.10.6
  • Linux Kernel 4.10.7
    cpe:2.3:o:linux:linux_kernel:4.10.7
  • Linux Kernel 4.10.8
    cpe:2.3:o:linux:linux_kernel:4.10.8
  • Linux Kernel 4.10.9
    cpe:2.3:o:linux:linux_kernel:4.10.9
  • Linux Kernel 4.10.10
    cpe:2.3:o:linux:linux_kernel:4.10.10
  • Linux Kernel 4.10.11
    cpe:2.3:o:linux:linux_kernel:4.10.11
  • Linux Kernel 4.10.12
    cpe:2.3:o:linux:linux_kernel:4.10.12
  • Linux Kernel 4.10.13
    cpe:2.3:o:linux:linux_kernel:4.10.13
  • Linux Kernel 4.10.14
    cpe:2.3:o:linux:linux_kernel:4.10.14
  • Linux Kernel 4.10.15
    cpe:2.3:o:linux:linux_kernel:4.10.15
  • Linux Kernel 4.10.16
    cpe:2.3:o:linux:linux_kernel:4.10.16
  • Linux Kernel 4.10.17
    cpe:2.3:o:linux:linux_kernel:4.10.17
  • Linux Kernel 4.11
    cpe:2.3:o:linux:linux_kernel:4.11
  • Linux Linux Kernel 4.11 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:4.11:rc1
  • Linux Linux Kernel 4.11 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:4.11:rc2
  • Linux Linux Kernel 4.11 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:4.11:rc3
  • Linux Linux Kernel 4.11 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:4.11:rc4
  • Linux Linux Kernel 4.11 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:4.11:rc5
  • Linux Linux Kernel 4.11 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:4.11:rc6
  • Linux Linux Kernel 4.11 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:4.11:rc7
  • Linux Kernel 4.11.1
    cpe:2.3:o:linux:linux_kernel:4.11.1
  • Linux Kernel 4.11.2
    cpe:2.3:o:linux:linux_kernel:4.11.2
  • Linux Kernel 4.11.3
    cpe:2.3:o:linux:linux_kernel:4.11.3
  • Linux Kernel 4.11.4
    cpe:2.3:o:linux:linux_kernel:4.11.4
  • Linux Kernel 4.11.5
    cpe:2.3:o:linux:linux_kernel:4.11.5
  • Linux Kernel 4.11.6
    cpe:2.3:o:linux:linux_kernel:4.11.6
  • Linux Kernel 4.11.7
    cpe:2.3:o:linux:linux_kernel:4.11.7
  • Linux Kernel 4.11.8
    cpe:2.3:o:linux:linux_kernel:4.11.8
  • Linux Kernel 4.11.9
    cpe:2.3:o:linux:linux_kernel:4.11.9
  • Linux Kernel 4.11.10
    cpe:2.3:o:linux:linux_kernel:4.11.10
  • Linux Kernel 4.11.11
    cpe:2.3:o:linux:linux_kernel:4.11.11
  • Linux Kernel 4.11.12
    cpe:2.3:o:linux:linux_kernel:4.11.12
  • Linux Kernel 4.12
    cpe:2.3:o:linux:linux_kernel:4.12
  • Linux Kernel 4.12.1
    cpe:2.3:o:linux:linux_kernel:4.12.1
  • Linux Kernel 4.12.2
    cpe:2.3:o:linux:linux_kernel:4.12.2
  • Linux Kernel 4.12.3
    cpe:2.3:o:linux:linux_kernel:4.12.3
  • Linux Kernel 4.12.4
    cpe:2.3:o:linux:linux_kernel:4.12.4
  • Linux Kernel 4.12.5
    cpe:2.3:o:linux:linux_kernel:4.12.5
  • Linux Kernel 4.12.6
    cpe:2.3:o:linux:linux_kernel:4.12.6
  • Linux Kernel 4.12.7
    cpe:2.3:o:linux:linux_kernel:4.12.7
  • Linux Kernel 4.12.8
    cpe:2.3:o:linux:linux_kernel:4.12.8
  • Linux Kernel 4.12.9
    cpe:2.3:o:linux:linux_kernel:4.12.9
  • Linux Kernel 4.12.10
    cpe:2.3:o:linux:linux_kernel:4.12.10
  • Linux Kernel 4.12.11
    cpe:2.3:o:linux:linux_kernel:4.12.11
  • Linux Kernel 4.12.12
    cpe:2.3:o:linux:linux_kernel:4.12.12
  • Linux Kernel 4.12.13
    cpe:2.3:o:linux:linux_kernel:4.12.13
  • Linux Kernel 4.12.14
    cpe:2.3:o:linux:linux_kernel:4.12.14
  • Linux Kernel 4.13
    cpe:2.3:o:linux:linux_kernel:4.13
  • Linux Kernel 4.13 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:4.13:rc1
  • Linux Kernel 4.13 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:4.13:rc2
  • Linux Kernel 4.13 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:4.13:rc3
  • Linux Kernel 4.13 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:4.13:rc4
  • Linux Kernel 4.13 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:4.13:rc5
  • Linux Kernel 4.13.1
    cpe:2.3:o:linux:linux_kernel:4.13.1
  • Linux Kernel 4.13.2
    cpe:2.3:o:linux:linux_kernel:4.13.2
  • Linux Kernel 4.13.3
    cpe:2.3:o:linux:linux_kernel:4.13.3
  • Linux Kernel 4.13.4
    cpe:2.3:o:linux:linux_kernel:4.13.4
  • Linux Kernel 4.13.5
    cpe:2.3:o:linux:linux_kernel:4.13.5
  • Linux Kernel 4.13.6
    cpe:2.3:o:linux:linux_kernel:4.13.6
  • Linux Kernel 4.13.7
    cpe:2.3:o:linux:linux_kernel:4.13.7
  • Linux Kernel 4.13.8
    cpe:2.3:o:linux:linux_kernel:4.13.8
  • Linux Kernel 4.13.9
    cpe:2.3:o:linux:linux_kernel:4.13.9
  • Linux Kernel 4.13.10
    cpe:2.3:o:linux:linux_kernel:4.13.10
  • Linux Kernel 4.13.11
    cpe:2.3:o:linux:linux_kernel:4.13.11
  • Linux Kernel 4.14
    cpe:2.3:o:linux:linux_kernel:4.14
  • Linux Kernel 4.14.1
    cpe:2.3:o:linux:linux_kernel:4.14.1
  • Linux Kernel 4.14.2
    cpe:2.3:o:linux:linux_kernel:4.14.2
  • Linux Kernel 4.14.3
    cpe:2.3:o:linux:linux_kernel:4.14.3
  • Linux Kernel 4.14.4
    cpe:2.3:o:linux:linux_kernel:4.14.4
  • Linux Kernel 4.14.5
    cpe:2.3:o:linux:linux_kernel:4.14.5
  • Linux Kernel 4.14.6
    cpe:2.3:o:linux:linux_kernel:4.14.6
  • Linux Kernel 4.14.7
    cpe:2.3:o:linux:linux_kernel:4.14.7
  • Linux Kernel 4.14.8
    cpe:2.3:o:linux:linux_kernel:4.14.8
  • Linux Kernel 4.14.9
    cpe:2.3:o:linux:linux_kernel:4.14.9
  • Linux Kernel 4.14.10
    cpe:2.3:o:linux:linux_kernel:4.14.10
  • Linux Kernel 4.14.11
    cpe:2.3:o:linux:linux_kernel:4.14.11
  • Linux Kernel 4.14.12
    cpe:2.3:o:linux:linux_kernel:4.14.12
  • Linux Kernel 4.14.13
    cpe:2.3:o:linux:linux_kernel:4.14.13
  • Linux Kernel 4.14.14
    cpe:2.3:o:linux:linux_kernel:4.14.14
  • Linux Kernel 4.14.15
    cpe:2.3:o:linux:linux_kernel:4.14.15
  • Linux Kernel 4.14.16
    cpe:2.3:o:linux:linux_kernel:4.14.16
  • Linux Kernel 4.14.17
    cpe:2.3:o:linux:linux_kernel:4.14.17
  • Linux Kernel 4.14.18
    cpe:2.3:o:linux:linux_kernel:4.14.18
  • Linux Kernel 4.14.19
    cpe:2.3:o:linux:linux_kernel:4.14.19
  • Linux Kernel 4.14.20
    cpe:2.3:o:linux:linux_kernel:4.14.20
  • Linux Kernel 4.14.21
    cpe:2.3:o:linux:linux_kernel:4.14.21
  • Linux Kernel 4.14.22
    cpe:2.3:o:linux:linux_kernel:4.14.22
  • Linux Kernel 4.14.23
    cpe:2.3:o:linux:linux_kernel:4.14.23
  • Linux Kernel 4.14.24
    cpe:2.3:o:linux:linux_kernel:4.14.24
  • Linux Kernel 4.14.25
    cpe:2.3:o:linux:linux_kernel:4.14.25
  • Linux Kernel 4.14.26
    cpe:2.3:o:linux:linux_kernel:4.14.26
  • Linux Kernel 4.14.27
    cpe:2.3:o:linux:linux_kernel:4.14.27
  • Linux Kernel 4.14.28
    cpe:2.3:o:linux:linux_kernel:4.14.28
  • Linux Kernel 4.14.29
    cpe:2.3:o:linux:linux_kernel:4.14.29
  • Linux Kernel 4.14.30
    cpe:2.3:o:linux:linux_kernel:4.14.30
  • Linux Kernel 4.14.31
    cpe:2.3:o:linux:linux_kernel:4.14.31
  • Linux Kernel 4.14.32
    cpe:2.3:o:linux:linux_kernel:4.14.32
  • Linux Kernel 4.14.33
    cpe:2.3:o:linux:linux_kernel:4.14.33
  • Linux Kernel 4.14.34
    cpe:2.3:o:linux:linux_kernel:4.14.34
  • Linux Kernel 4.15
    cpe:2.3:o:linux:linux_kernel:4.15
  • Linux Kernel 4.15 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:4.15:rc4
  • Linux Kernel 4.15.1
    cpe:2.3:o:linux:linux_kernel:4.15.1
  • Linux Kernel 4.15.2
    cpe:2.3:o:linux:linux_kernel:4.15.2
  • Linux Kernel 4.15.3
    cpe:2.3:o:linux:linux_kernel:4.15.3
  • Linux Kernel 4.15.4
    cpe:2.3:o:linux:linux_kernel:4.15.4
  • Linux Kernel 4.15.5
    cpe:2.3:o:linux:linux_kernel:4.15.5
  • Linux Kernel 4.15.6
    cpe:2.3:o:linux:linux_kernel:4.15.6
  • Linux Kernel 4.15.7
    cpe:2.3:o:linux:linux_kernel:4.15.7
  • Linux Kernel 4.15.8
    cpe:2.3:o:linux:linux_kernel:4.15.8
  • Linux Kernel 4.15.9
    cpe:2.3:o:linux:linux_kernel:4.15.9
  • Linux Kernel 4.15.10
    cpe:2.3:o:linux:linux_kernel:4.15.10
  • Linux Kernel 4.15.11
    cpe:2.3:o:linux:linux_kernel:4.15.11
  • Linux Kernel 4.16
    cpe:2.3:o:linux:linux_kernel:4.16
  • Linux Kernel 4.16 Release Candidate
    cpe:2.3:o:linux:linux_kernel:4.16:rc
  • Linux Kernel 4.16 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:4.16:rc1
  • Linux Kernel 4.16 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:4.16:rc2
  • Linux Kernel 4.16 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:4.16:rc3
  • Linux Kernel 4.16 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:4.16:rc4
  • Linux Kernel 4.16 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:4.16:rc5
  • Linux Kernel 4.16 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:4.16:rc6
CVSS
Base: 6.1
Impact:
Exploitability:
CWE CWE-754
CAPEC
nessus via4
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3632-1.NASL
    description It was discovered that a race condition leading to a use-after-free vulnerability existed in the ALSA PCM subsystem of the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-0861) It was discovered that the KVM implementation in the Linux kernel allowed passthrough of the diagnostic I/O port 0x80. An attacker in a guest VM could use this to cause a denial of service (system crash) in the host OS. (CVE-2017-1000407) It was discovered that a use-after-free vulnerability existed in the network namespaces implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-15129) It was discovered that the HugeTLB component of the Linux kernel did not properly handle holes in hugetlb ranges. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2017-16994) It was discovered that the netfilter component of the Linux did not properly restrict access to the connection tracking helpers list. A local attacker could use this to bypass intended access restrictions. (CVE-2017-17448) It was discovered that the netfilter passive OS fingerprinting (xt_osf) module did not properly perform access control checks. A local attacker could improperly modify the system-wide OS fingerprint list. (CVE-2017-17450) Dmitry Vyukov discovered that the KVM implementation in the Linux kernel contained an out-of-bounds read when handling memory-mapped I/O. A local attacker could use this to expose sensitive information. (CVE-2017-17741) It was discovered that the Salsa20 encryption algorithm implementations in the Linux kernel did not properly handle zero-length inputs. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-17805) It was discovered that the HMAC implementation did not validate the state of the underlying cryptographic hash algorithm. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-17806) It was discovered that the keyring implementation in the Linux kernel did not properly check permissions when a key request was performed on a task's default keyring. A local attacker could use this to add keys to unauthorized keyrings. (CVE-2017-17807) It was discovered that the Broadcom NetXtremeII ethernet driver in the Linux kernel did not properly validate Generic Segment Offload (GSO) packet sizes. An attacker could use this to cause a denial of service (interface unavailability). (CVE-2018-1000026) It was discovered that the Reliable Datagram Socket (RDS) implementation in the Linux kernel contained an out-of-bounds write during RDMA page allocation. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-5332) Mohamed Ghannam discovered a NULL pointer dereference in the RDS (Reliable Datagram Sockets) protocol implementation of the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-5333) Fan Long Fei discovered that a race condition existed in loop block device implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-5344) It was discovered that the Broadcom UniMAC MDIO bus controller driver in the Linux kernel did not properly validate device resources. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-8043). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-04-25
    modified 2018-04-24
    plugin id 109316
    published 2018-04-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=109316
    title Ubuntu 16.04 LTS : linux-azure vulnerabilities (USN-3632-1)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20180410_KERNEL_ON_SL7_X.NASL
    description Security Fix(es) : - hw: cpu: speculative execution permission faults handling (CVE-2017-5754, Important, KVM for Power) - kernel: Buffer overflow in firewire driver via crafted incoming packets (CVE-2016-8633, Important) - kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824, Important) - Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register (CVE-2017-12154, Important) - kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166, Important) - kernel: media: use-after-free in [tuner-xc2028] media driver (CVE-2016-7913, Moderate) - kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() (CVE-2017-7294, Moderate) - kernel: Incorrect type conversion for size during dma allocation (CVE-2017-9725, Moderate) - kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190, Moderate) - kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121, Moderate) - kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c (CVE-2017-15126, Moderate) - kernel: net: double-free and memory corruption in get_net_ns_by_id() (CVE-2017-15129, Moderate) - kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265, Moderate) - kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure (CVE-2017-17448, Moderate) - kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity (CVE-2017-17449, Moderate) - kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow (CVE-2017-17558, Moderate) - kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017, Moderate) - kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203, Moderate) - kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ (CVE-2017-1000252, Moderate) - Kernel: KVM: DoS via write flood to I/O port 0x80 (CVE-2017-1000407, Moderate) - kernel: Stack information leak in the EFS element (CVE-2017-1000410, Moderate) - kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass (CVE-2018-5750, Moderate) - kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004, Moderate) - kernel: multiple Low security impact security issues (CVE-2016-3672, CVE-2017-14140, CVE-2017-15116, CVE-2017-15127, CVE-2018-6927, Low) Additional Changes :
    last seen 2018-05-06
    modified 2018-05-04
    plugin id 109449
    published 2018-05-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=109449
    title Scientific Linux Security Update : kernel on SL7.x x86_64 (Meltdown)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2018-1062.NASL
    description From Red Hat Security Advisory 2018:1062 : An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * hw: cpu: speculative execution permission faults handling (CVE-2017-5754, Important, KVM for Power) * kernel: Buffer overflow in firewire driver via crafted incoming packets (CVE-2016-8633, Important) * kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824, Important) * Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register (CVE-2017-12154, Important) * kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166, Important) * kernel: media: use-after-free in [tuner-xc2028] media driver (CVE-2016-7913, Moderate) * kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() (CVE-2017-7294, Moderate) * kernel: Incorrect type conversion for size during dma allocation (CVE-2017-9725, Moderate) * kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190, Moderate) * kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121, Moderate) * kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c (CVE-2017-15126, Moderate) * kernel: net: double-free and memory corruption in get_net_ns_by_id() (CVE-2017-15129, Moderate) * kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265, Moderate) * kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure (CVE-2017-17448, Moderate) * kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity (CVE-2017-17449, Moderate) * kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow (CVE-2017-17558, Moderate) * kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/ netfilter/xt_TCPMSS.c (CVE-2017-18017, Moderate) * kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203, Moderate) * kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ (CVE-2017-1000252, Moderate) * Kernel: KVM: DoS via write flood to I/O port 0x80 (CVE-2017-1000407, Moderate) * kernel: Stack information leak in the EFS element (CVE-2017-1000410, Moderate) * kernel: Kernel address information leak in drivers/acpi/ sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass (CVE-2018-5750, Moderate) * kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004, Moderate) * kernel: multiple Low security impact security issues (CVE-2016-3672, CVE-2017-14140, CVE-2017-15116, CVE-2017-15127, CVE-2018-6927, Low) Red Hat would like to thank Eyal Itkin for reporting CVE-2016-8633; Google Project Zero for reporting CVE-2017-5754; Mohamed Ghannam for reporting CVE-2017-8824; Jim Mattson (Google.com) for reporting CVE-2017-12154; Vitaly Mayatskih for reporting CVE-2017-12190; Andrea Arcangeli (Engineering) for reporting CVE-2017-15126; Kirill Tkhai for reporting CVE-2017-15129; Jan H. Schonherr (Amazon) for reporting CVE-2017-1000252; and Armis Labs for reporting CVE-2017-1000410. The CVE-2017-15121 issue was discovered by Miklos Szeredi (Red Hat) and the CVE-2017-15116 issue was discovered by ChunYu Wang (Red Hat). For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.5 Release Notes linked from the References section.
    last seen 2018-04-18
    modified 2018-04-18
    plugin id 109113
    published 2018-04-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=109113
    title Oracle Linux 7 : kernel (ELSA-2018-1062)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-4073.NASL
    description Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. - CVE-2017-8824 Mohamed Ghannam discovered that the DCCP implementation did not correctly manage resources when a socket is disconnected and reconnected, potentially leading to a use-after-free. A local user could use this for denial of service (crash or data corruption) or possibly for privilege escalation. On systems that do not already have the dccp module loaded, this can be mitigated by disabling it:echo >> /etc/modprobe.d/disable-dccp.conf install dccp false - CVE-2017-16538 Andrey Konovalov reported that the dvb-usb-lmedm04 media driver did not correctly handle some error conditions during initialisation. A physically present user with a specially designed USB device can use this to cause a denial of service (crash). - CVE-2017-16644 Andrey Konovalov reported that the hdpvr media driver did not correctly handle some error conditions during initialisation. A physically present user with a specially designed USB device can use this to cause a denial of service (crash). - CVE-2017-16995 Jann Horn discovered that the Extended BPF verifier did not correctly model the behaviour of 32-bit load instructions. A local user can use this for privilege escalation. - CVE-2017-17448 Kevin Cernekee discovered that the netfilter subsystem allowed users with the CAP_NET_ADMIN capability in any user namespace, not just the root namespace, to enable and disable connection tracking helpers. This could lead to denial of service, violation of network security policy, or have other impact. - CVE-2017-17449 Kevin Cernekee discovered that the netlink subsystem allowed users with the CAP_NET_ADMIN capability in any user namespace to monitor netlink traffic in all net namespaces, not just those owned by that user namespace. This could lead to exposure of sensitive information. - CVE-2017-17450 Kevin Cernekee discovered that the xt_osf module allowed users with the CAP_NET_ADMIN capability in any user namespace to modify the global OS fingerprint list. - CVE-2017-17558 Andrey Konovalov reported that that USB core did not correctly handle some error conditions during initialisation. A physically present user with a specially designed USB device can use this to cause a denial of service (crash or memory corruption), or possibly for privilege escalation. - CVE-2017-17712 Mohamed Ghannam discovered a race condition in the IPv4 raw socket implementation. A local user could use this to obtain sensitive information from the kernel. - CVE-2017-17741 Dmitry Vyukov reported that the KVM implementation for x86 would over-read data from memory when emulating an MMIO write if the kvm_mmio tracepoint was enabled. A guest virtual machine might be able to use this to cause a denial of service (crash). - CVE-2017-17805 It was discovered that some implementations of the Salsa20 block cipher did not correctly handle zero-length input. A local user could use this to cause a denial of service (crash) or possibly have other security impact. - CVE-2017-17806 It was discovered that the HMAC implementation could be used with an underlying hash algorithm that requires a key, which was not intended. A local user could use this to cause a denial of service (crash or memory corruption), or possibly for privilege escalation. - CVE-2017-17807 Eric Biggers discovered that the KEYS subsystem lacked a check for write permission when adding keys to a process's default keyring. A local user could use this to cause a denial of service or to obtain sensitive information. - CVE-2017-17862 Alexei Starovoitov discovered that the Extended BPF verifier ignored unreachable code, even though it would still be processed by JIT compilers. This could possibly be used by local users for denial of service. It also increases the severity of bugs in determining unreachable code. - CVE-2017-17863 Jann Horn discovered that the Extended BPF verifier did not correctly model pointer arithmetic on the stack frame pointer. A local user can use this for privilege escalation. - CVE-2017-17864 Jann Horn discovered that the Extended BPF verifier could fail to detect pointer leaks from conditional code. A local user could use this to obtain sensitive information in order to exploit other vulnerabilities. - CVE-2017-1000407 Andrew Honig reported that the KVM implementation for Intel processors allowed direct access to host I/O port 0x80, which is not generally safe. On some systems this allows a guest VM to cause a denial of service (crash) of the host. - CVE-2017-1000410 Ben Seri reported that the Bluetooth subsystem did not correctly handle short EFS information elements in L2CAP messages. An attacker able to communicate over Bluetooth could use this to obtain sensitive information from the kernel. The various problems in the Extended BPF verifier can be mitigated by disabling use of Extended BPF by unprivileged users:sysctl kernel.unprivileged_bpf_disabled=1 Debian disables unprivileged user namespaces by default, but if they are enabled (via the kernel.unprivileged_userns_clone sysctl) then CVE-2017-17448 can be exploited by any local user.
    last seen 2018-07-30
    modified 2018-07-26
    plugin id 105433
    published 2017-12-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105433
    title Debian DSA-4073-1 : linux - security update
  • NASL family OracleVM Local Security Checks
    NASL id ORACLEVM_OVMSA-2018-0012.NASL
    description The remote OracleVM system is missing necessary patches to address critical security updates : - Revert 'kernel.spec: Require the new microcode_ctl.' (Brian Maly) - xen-blkback: add pending_req allocation stats (Ankur Arora) [Orabug: 27386890] - xen-blkback: move indirect req allocation out-of-line (Ankur Arora) - xen-blkback: pull nseg validation out in a function (Ankur Arora) - xen-blkback: make struct pending_req less monolithic (Ankur Arora) - x86: Clean up IBRS functionality resident in common code (Kanth Ghatraju) [Orabug: 27403317] - x86: Display correct settings for the SPECTRE_V2 bug (Kanth Ghatraju) - Set CONFIG_GENERIC_CPU_VULNERABILITIES flag (Kanth Ghatraju) [Orabug: 27403317] - x86/cpu: Implement CPU vulnerabilites sysfs functions (Thomas Gleixner) [Orabug: 27403317] - sysfs/cpu: Fix typos in vulnerability documentation (David Woodhouse) - sysfs/cpu: Add vulnerability folder (Thomas Gleixner) [Orabug: 27403317] - x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (David Woodhouse) [Orabug: 27403317] - x86/cpufeatures: Add X86_BUG_CPU_MELTDOWN (Kanth Ghatraju) [Orabug: 27403317] - KVM: x86: Add memory barrier on vmcs field lookup (Andrew Honig) (CVE-2017-5753) - KVM: VMX: remove I/O port 0x80 bypass on Intel hosts (Andrew Honig) [Orabug: 27402301] (CVE-2017-1000407) (CVE-2017-1000407) - xfs: give all workqueues rescuer threads (Chris Mason) [Orabug: 27397568] - ixgbevf: handle mbox_api_13 in ixgbevf_change_mtu (Joao Martins)
    last seen 2018-07-30
    modified 2018-07-24
    plugin id 106226
    published 2018-01-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=106226
    title OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0012) (Spectre)
  • NASL family Virtuozzo Local Security Checks
    NASL id VIRTUOZZO_VZA-2017-111.NASL
    description According to the version of the vzkernel package and the readykernel-patch installed, the Virtuozzo installation on the remote host is affected by the following vulnerabilities : - dccp_disconnect() set the socket state to DCCP_CLOSED but did not properly free some of the resources associated with that socket. This could result in a use-after-free and could potentially allow an attacker to escalate their privileges. - The Linux kernel is vulnerable to a use-after-free issue. It could occur while closing a xfrm netlink socket, in xfrm_dump_policy_done. A user/process could use this flaw to potentially escalate their privileges on a system. - A flaw was found in the patches used to fix the 'Dirty COW' vulnerability (CVE-2016-5195). An attacker, able to run local code, can exploit a race condition in transparent huge pages to modify usually read-only huge pages. - A vulnerability was found in the kernel virtualization module (KVM) for the Intel processors. A guest system could flood the I/O port 0x80 with write requests, which could crash the host kernel, resulting in DoS. Note that Tenable Network Security has extracted the preceding description block directly from the Virtuozzo security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-07-21
    modified 2018-07-17
    plugin id 105167
    published 2017-12-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105167
    title Virtuozzo 7 : readykernel-patch (VZA-2017-111)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2018-0676.NASL
    description An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es) : * kernel: Buffer overflow in firewire driver via crafted incoming packets (CVE-2016-8633, Important) * kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824, Important) * Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register (CVE-2017-12154, Important) * kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166, Important) * kernel: media: use-after-free in [tuner-xc2028] media driver (CVE-2016-7913, Moderate) * kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() (CVE-2017-7294, Moderate) * kernel: Incorrect type conversion for size during dma allocation (CVE-2017-9725, Moderate) * kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190, Moderate) * kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121, Moderate) * kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c (CVE-2017-15126, Moderate) * kernel: net: double-free and memory corruption in get_net_ns_by_id() (CVE-2017-15129, Moderate) * kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265, Moderate) * kernel: Incorrect handling in arch/x86/include/asm/ mmu_context.h:init_new_context function allowing use-after-free (CVE-2017-17053, Moderate) * kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure (CVE-2017-17448, Moderate) * kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity (CVE-2017-17449, Moderate) * kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow (CVE-2017-17558, Moderate) * kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/ netfilter/xt_TCPMSS.c (CVE-2017-18017, Moderate) * kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203, Moderate) * kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ (CVE-2017-1000252, Moderate) * Kernel: KVM: DoS via write flood to I/O port 0x80 (CVE-2017-1000407, Moderate) * kernel: Stack information leak in the EFS element (CVE-2017-1000410, Moderate) * kernel: Kernel address information leak in drivers/acpi/ sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass (CVE-2018-5750, Moderate) * kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004, Moderate) * kernel: unlimiting the stack disables ASLR (CVE-2016-3672, Low) * kernel: Missing permission check in move_pages system call (CVE-2017-14140, Low) * kernel: NULL pointer dereference in rngapi_reset function (CVE-2017-15116, Low) * kernel: Improper error handling of VM_SHARED hugetlbfs mapping in mm/ hugetlb.c (CVE-2017-15127, Low) * kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact (CVE-2018-6927, Low) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Eyal Itkin for reporting CVE-2016-8633; Mohamed Ghannam for reporting CVE-2017-8824; Jim Mattson (Google.com) for reporting CVE-2017-12154; Vitaly Mayatskih for reporting CVE-2017-12190; Andrea Arcangeli (Engineering) for reporting CVE-2017-15126; Kirill Tkhai for reporting CVE-2017-15129; Jan H. Schonherr (Amazon) for reporting CVE-2017-1000252; and Armis Labs for reporting CVE-2017-1000410. The CVE-2017-15121 issue was discovered by Miklos Szeredi (Red Hat) and the CVE-2017-15116 issue was discovered by ChunYu Wang (Red Hat). Additional Changes : See the Red Hat Enterprise Linux 7.5 Release Notes linked from References.
    last seen 2018-04-13
    modified 2018-04-12
    plugin id 108984
    published 2018-04-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108984
    title RHEL 7 : kernel-rt (RHSA-2018:0676)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-4082.NASL
    description Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. - CVE-2017-5754 Multiple researchers have discovered a vulnerability in Intel processors, enabling an attacker controlling an unprivileged process to read memory from arbitrary addresses, including from the kernel and all other processes running on the system. This specific attack has been named Meltdown and is addressed in the Linux kernel for the Intel x86-64 architecture by a patch set named Kernel Page Table Isolation, enforcing a near complete separation of the kernel and userspace address maps and preventing the attack. This solution might have a performance impact, and can be disabled at boot time by passing pti=off to the kernel command line. - CVE-2017-8824 Mohamed Ghannam discovered that the DCCP implementation did not correctly manage resources when a socket is disconnected and reconnected, potentially leading to a use-after-free. A local user could use this for denial of service (crash or data corruption) or possibly for privilege escalation. On systems that do not already have the dccp module loaded, this can be mitigated by disabling it:echo >> /etc/modprobe.d/disable-dccp.conf install dccp false - CVE-2017-15868 Al Viro found that the Bluebooth Network Encapsulation Protocol (BNEP) implementation did not validate the type of the second socket passed to the BNEPCONNADD ioctl(), which could lead to memory corruption. A local user with the CAP_NET_ADMIN capability can use this for denial of service (crash or data corruption) or possibly for privilege escalation. - CVE-2017-16538 Andrey Konovalov reported that the dvb-usb-lmedm04 media driver did not correctly handle some error conditions during initialisation. A physically present user with a specially designed USB device can use this to cause a denial of service (crash). - CVE-2017-16939 Mohamed Ghannam reported (through Beyond Security's SecuriTeam Secure Disclosure program) that the IPsec (xfrm) implementation did not correctly handle some failure cases when dumping policy information through netlink. A local user with the CAP_NET_ADMIN capability can use this for denial of service (crash or data corruption) or possibly for privilege escalation. - CVE-2017-17448 Kevin Cernekee discovered that the netfilter subsystem allowed users with the CAP_NET_ADMIN capability in any user namespace, not just the root namespace, to enable and disable connection tracking helpers. This could lead to denial of service, violation of network security policy, or have other impact. - CVE-2017-17449 Kevin Cernekee discovered that the netlink subsystem allowed users with the CAP_NET_ADMIN capability in any user namespace to monitor netlink traffic in all net namespaces, not just those owned by that user namespace. This could lead to exposure of sensitive information. - CVE-2017-17450 Kevin Cernekee discovered that the xt_osf module allowed users with the CAP_NET_ADMIN capability in any user namespace to modify the global OS fingerprint list. - CVE-2017-17558 Andrey Konovalov reported that that USB core did not correctly handle some error conditions during initialisation. A physically present user with a specially designed USB device can use this to cause a denial of service (crash or memory corruption), or possibly for privilege escalation. - CVE-2017-17741 Dmitry Vyukov reported that the KVM implementation for x86 would over-read data from memory when emulating an MMIO write if the kvm_mmio tracepoint was enabled. A guest virtual machine might be able to use this to cause a denial of service (crash). - CVE-2017-17805 It was discovered that some implementations of the Salsa20 block cipher did not correctly handle zero-length input. A local user could use this to cause a denial of service (crash) or possibly have other security impact. - CVE-2017-17806 It was discovered that the HMAC implementation could be used with an underlying hash algorithm that requires a key, which was not intended. A local user could use this to cause a denial of service (crash or memory corruption), or possibly for privilege escalation. - CVE-2017-17807 Eric Biggers discovered that the KEYS subsystem lacked a check for write permission when adding keys to a process's default keyring. A local user could use this to cause a denial of service or to obtain sensitive information. - CVE-2017-1000407 Andrew Honig reported that the KVM implementation for Intel processors allowed direct access to host I/O port 0x80, which is not generally safe. On some systems this allows a guest VM to cause a denial of service (crash) of the host. - CVE-2017-1000410 Ben Seri reported that the Bluetooth subsystem did not correctly handle short EFS information elements in L2CAP messages. An attacker able to communicate over Bluetooth could use this to obtain sensitive information from the kernel.
    last seen 2018-01-31
    modified 2018-01-30
    plugin id 105704
    published 2018-01-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105704
    title Debian DSA-4082-1 : linux - security update (Meltdown)
  • NASL family OracleVM Local Security Checks
    NASL id ORACLEVM_OVMSA-2018-0015.NASL
    description The remote OracleVM system is missing necessary patches to address critical security updates : please see Oracle VM Security Advisory OVMSA-2018-0015 for details.
    last seen 2018-07-30
    modified 2018-07-24
    plugin id 106469
    published 2018-01-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=106469
    title OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0015) (BlueBorne) (Meltdown) (Spectre) (Stack Clash)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3619-2.NASL
    description USN-3619-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS. Jann Horn discovered that the Berkeley Packet Filter (BPF) implementation in the Linux kernel improperly performed sign extension in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16995) It was discovered that a race condition leading to a use-after-free vulnerability existed in the ALSA PCM subsystem of the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-0861) It was discovered that the KVM implementation in the Linux kernel allowed passthrough of the diagnostic I/O port 0x80. An attacker in a guest VM could use this to cause a denial of service (system crash) in the host OS. (CVE-2017-1000407) It was discovered that an information disclosure vulnerability existed in the ACPI implementation of the Linux kernel. A local attacker could use this to expose sensitive information (kernel memory addresses). (CVE-2017-11472) It was discovered that a use-after-free vulnerability existed in the network namespaces implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-15129) It was discovered that the Advanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel contained a use-after-free when handling device removal. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16528) Andrey Konovalov discovered that the usbtest device driver in the Linux kernel did not properly validate endpoint metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16532) Andrey Konovalov discovered that the Conexant cx231xx USB video capture driver in the Linux kernel did not properly validate interface descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16536) Andrey Konovalov discovered that the SoundGraph iMON USB driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16537) Andrey Konovalov discovered that the IMS Passenger Control Unit USB driver in the Linux kernel did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16645) Andrey Konovalov discovered that the DiBcom DiB0700 USB DVB driver in the Linux kernel did not properly handle detach events. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16646) Andrey Konovalov discovered that the CDC USB Ethernet driver did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16649) Andrey Konovalov discovered that the QMI WWAN USB driver did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16650) It was discovered that the USB Virtual Host Controller Interface (VHCI) driver in the Linux kernel contained an information disclosure vulnerability. A physically proximate attacker could use this to expose sensitive information (kernel memory). (CVE-2017-16911) It was discovered that the USB over IP implementation in the Linux kernel did not validate endpoint numbers. A remote attacker could use this to cause a denial of service (system crash). (CVE-2017-16912) It was discovered that the USB over IP implementation in the Linux kernel did not properly validate CMD_SUBMIT packets. A remote attacker could use this to cause a denial of service (excessive memory consumption). (CVE-2017-16913) It was discovered that the USB over IP implementation in the Linux kernel contained a NULL pointer dereference error. A remote attacker could use this to cause a denial of service (system crash). (CVE-2017-16914) It was discovered that the HugeTLB component of the Linux kernel did not properly handle holes in hugetlb ranges. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2017-16994) It was discovered that the netfilter component of the Linux did not properly restrict access to the connection tracking helpers list. A local attacker could use this to bypass intended access restrictions. (CVE-2017-17448) It was discovered that the netlink subsystem in the Linux kernel did not properly restrict observations of netlink messages to the appropriate net namespace. A local attacker could use this to expose sensitive information (kernel netlink traffic). (CVE-2017-17449) It was discovered that the netfilter passive OS fingerprinting (xt_osf) module did not properly perform access control checks. A local attacker could improperly modify the system-wide OS fingerprint list. (CVE-2017-17450) It was discovered that the core USB subsystem in the Linux kernel did not validate the number of configurations and interfaces in a device. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-17558) Dmitry Vyukov discovered that the KVM implementation in the Linux kernel contained an out-of-bounds read when handling memory-mapped I/O. A local attacker could use this to expose sensitive information. (CVE-2017-17741) It was discovered that the Salsa20 encryption algorithm implementations in the Linux kernel did not properly handle zero-length inputs. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-17805) It was discovered that the HMAC implementation did not validate the state of the underlying cryptographic hash algorithm. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-17806) It was discovered that the keyring implementation in the Linux kernel did not properly check permissions when a key request was performed on a task's default keyring. A local attacker could use this to add keys to unauthorized keyrings. (CVE-2017-17807) Alexei Starovoitov discovered that the Berkeley Packet Filter (BPF) implementation in the Linux kernel contained a branch-pruning logic issue around unreachable code. A local attacker could use this to cause a denial of service. (CVE-2017-17862) It was discovered that the parallel cryptography component of the Linux kernel incorrectly freed kernel memory. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-18075) It was discovered that a race condition existed in the Device Mapper component of the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-18203) It was discovered that a race condition existed in the OCFS2 file system implementation in the Linux kernel. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2017-18204) It was discovered that an infinite loop could occur in the the madvise(2) implementation in the Linux kernel in certain circumstances. A local attacker could use this to cause a denial of service (system hang). (CVE-2017-18208) Andy Lutomirski discovered that the KVM implementation in the Linux kernel was vulnerable to a debug exception error when single-stepping through a syscall. A local attacker in a non-Linux guest vm could possibly use this to gain administrative privileges in the guest vm. (CVE-2017-7518) It was discovered that the Broadcom NetXtremeII ethernet driver in the Linux kernel did not properly validate Generic Segment Offload (GSO) packet sizes. An attacker could use this to cause a denial of service (interface unavailability). (CVE-2018-1000026) It was discovered that the Reliable Datagram Socket (RDS) implementation in the Linux kernel contained an out-of-bounds write during RDMA page allocation. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-5332) Mohamed Ghannam discovered a NULL pointer dereference in the RDS (Reliable Datagram Sockets) protocol implementation of the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-5333) Fan Long Fei discovered that a race condition existed in loop block device implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-5344) It was discovered that an integer overflow error existed in the futex implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-6927) It was discovered that a NULL pointer dereference existed in the RDS (Reliable Datagram Sockets) protocol implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-7492) It was discovered that the Broadcom UniMAC MDIO bus controller driver in the Linux kernel did not properly validate device resources. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-8043). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-07-30
    modified 2018-07-26
    plugin id 108878
    published 2018-04-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108878
    title Ubuntu 14.04 LTS : linux-lts-xenial, linux-aws vulnerabilities (USN-3619-2)
  • NASL family Virtuozzo Local Security Checks
    NASL id VIRTUOZZO_VZA-2017-110.NASL
    description According to the version of the vzkernel package and the readykernel-patch installed, the Virtuozzo installation on the remote host is affected by the following vulnerabilities : - dccp_disconnect() set the socket state to DCCP_CLOSED but did not properly free some of the resources associated with that socket. This could result in a use-after-free and could potentially allow an attacker to escalate their privileges. - The Linux kernel is vulnerable to a use-after-free issue. It could occur while closing a xfrm netlink socket, in xfrm_dump_policy_done. A user/process could use this flaw to potentially escalate their privileges on a system. - A flaw was found in the patches used to fix the 'Dirty COW' vulnerability (CVE-2016-5195). An attacker, able to run local code, can exploit a race condition in transparent huge pages to modify usually read-only huge pages. - A vulnerability was found in the kernel virtualization module (KVM) for the Intel processors. A guest system could flood the I/O port 0x80 with write requests, which could crash the host kernel, resulting in DoS. Note that Tenable Network Security has extracted the preceding description block directly from the Virtuozzo security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-07-21
    modified 2018-07-17
    plugin id 105166
    published 2017-12-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105166
    title Virtuozzo 7 : readykernel-patch (VZA-2017-110)
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2018-1031.NASL
    description According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - The hid_input_field function in drivers/hid/hid-core.c in the Linux kernel before 4.6 allows physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver.(CVE-2016-7915) - In the Linux kernel through 4.14.13, drivers/block/loop.c mishandles lo_release serialization, which allows attackers to cause a denial of service (__lock_acquire use-after-free) or possibly have unspecified other impact.(CVE-2018-5344) - In the Linux kernel through 4.14.13, the rds_cmsg_atomic() function in 'net/rds/rdma.c' mishandles cases where page pinning fails or an invalid address is supplied by a user. This can lead to a NULL pointer dereference in rds_atomic_free_op() and thus to a system panic.(CVE-2018-5333) - In the Linux kernel through 4.14.13, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size() function in 'net/rds/rdma.c') and thus to a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.(CVE-2018-5332) - A flaw was found in the upstream kernel Skcipher component. This vulnerability affects the skcipher_recvmsg function of the component Skcipher. The manipulation with an unknown input leads to a privilege escalation vulnerability.(CVE-2017-13215) - The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.(CVE-2017-18017) - The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.(CVE-2017-17805) - The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.(CVE-2017-17806) - he KEYS subsystem in the Linux kernel before 4.14.6 omitted an access-control check when adding a key to the current task's 'default request-key keyring' via the request_key() system call, allowing a local user to use a sequence of crafted system calls to add keys to a keyring with only Search permission (not Write permission) to that keyring, related to construct_get_dest_keyring() in security/keys/request_key.c.(CVE-2017-17807) - The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.(CVE-2017-1000407) - The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel before 4.13.11 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages.(CVE-2017-16939) - The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.(CVE-2017-8824) - net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.(CVE-2017-17448) - Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.(CVE-2017-0861) - The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allows local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device.(CVE-2017-17558) - The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.(CVE-2017-17449) - net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.(CVE-2017-17450) - The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel before 3.19 does not ensure that an l2cap socket is available, which allows local users to gain privileges via a crafted application.(CVE-2017-15868) - The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.(CVE-2016-3695) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-08-11
    modified 2018-08-10
    plugin id 106406
    published 2018-01-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=106406
    title EulerOS 2.0 SP1 : kernel (EulerOS-SA-2018-1031)
  • NASL family OracleVM Local Security Checks
    NASL id ORACLEVM_OVMSA-2018-0035.NASL
    description The remote OracleVM system is missing necessary patches to address critical security updates : please see Oracle VM Security Advisory OVMSA-2018-0035 for details.
    last seen 2018-08-05
    modified 2018-08-03
    plugin id 109158
    published 2018-04-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=109158
    title OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0035) (Dirty COW) (Meltdown) (Spectre)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3619-1.NASL
    description Jann Horn discovered that the Berkeley Packet Filter (BPF) implementation in the Linux kernel improperly performed sign extension in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16995) It was discovered that a race condition leading to a use-after-free vulnerability existed in the ALSA PCM subsystem of the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-0861) It was discovered that the KVM implementation in the Linux kernel allowed passthrough of the diagnostic I/O port 0x80. An attacker in a guest VM could use this to cause a denial of service (system crash) in the host OS. (CVE-2017-1000407) It was discovered that an information disclosure vulnerability existed in the ACPI implementation of the Linux kernel. A local attacker could use this to expose sensitive information (kernel memory addresses). (CVE-2017-11472) It was discovered that a use-after-free vulnerability existed in the network namespaces implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-15129) It was discovered that the Advanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel contained a use-after-free when handling device removal. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16528) Andrey Konovalov discovered that the usbtest device driver in the Linux kernel did not properly validate endpoint metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16532) Andrey Konovalov discovered that the Conexant cx231xx USB video capture driver in the Linux kernel did not properly validate interface descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16536) Andrey Konovalov discovered that the SoundGraph iMON USB driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16537) Andrey Konovalov discovered that the IMS Passenger Control Unit USB driver in the Linux kernel did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16645) Andrey Konovalov discovered that the DiBcom DiB0700 USB DVB driver in the Linux kernel did not properly handle detach events. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16646) Andrey Konovalov discovered that the CDC USB Ethernet driver did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16649) Andrey Konovalov discovered that the QMI WWAN USB driver did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16650) It was discovered that the USB Virtual Host Controller Interface (VHCI) driver in the Linux kernel contained an information disclosure vulnerability. A physically proximate attacker could use this to expose sensitive information (kernel memory). (CVE-2017-16911) It was discovered that the USB over IP implementation in the Linux kernel did not validate endpoint numbers. A remote attacker could use this to cause a denial of service (system crash). (CVE-2017-16912) It was discovered that the USB over IP implementation in the Linux kernel did not properly validate CMD_SUBMIT packets. A remote attacker could use this to cause a denial of service (excessive memory consumption). (CVE-2017-16913) It was discovered that the USB over IP implementation in the Linux kernel contained a NULL pointer dereference error. A remote attacker could use this to cause a denial of service (system crash). (CVE-2017-16914) It was discovered that the HugeTLB component of the Linux kernel did not properly handle holes in hugetlb ranges. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2017-16994) It was discovered that the netfilter component of the Linux did not properly restrict access to the connection tracking helpers list. A local attacker could use this to bypass intended access restrictions. (CVE-2017-17448) It was discovered that the netlink subsystem in the Linux kernel did not properly restrict observations of netlink messages to the appropriate net namespace. A local attacker could use this to expose sensitive information (kernel netlink traffic). (CVE-2017-17449) It was discovered that the netfilter passive OS fingerprinting (xt_osf) module did not properly perform access control checks. A local attacker could improperly modify the system-wide OS fingerprint list. (CVE-2017-17450) It was discovered that the core USB subsystem in the Linux kernel did not validate the number of configurations and interfaces in a device. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-17558) Dmitry Vyukov discovered that the KVM implementation in the Linux kernel contained an out-of-bounds read when handling memory-mapped I/O. A local attacker could use this to expose sensitive information. (CVE-2017-17741) It was discovered that the Salsa20 encryption algorithm implementations in the Linux kernel did not properly handle zero-length inputs. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-17805) It was discovered that the HMAC implementation did not validate the state of the underlying cryptographic hash algorithm. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-17806) It was discovered that the keyring implementation in the Linux kernel did not properly check permissions when a key request was performed on a task's' default keyring. A local attacker could use this to add keys to unauthorized keyrings. (CVE-2017-17807) Alexei Starovoitov discovered that the Berkeley Packet Filter (BPF) implementation in the Linux kernel contained a branch-pruning logic issue around unreachable code. A local attacker could use this to cause a denial of service. (CVE-2017-17862) It was discovered that the parallel cryptography component of the Linux kernel incorrectly freed kernel memory. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-18075) It was discovered that a race condition existed in the Device Mapper component of the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-18203) It was discovered that a race condition existed in the OCFS2 file system implementation in the Linux kernel. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2017-18204) It was discovered that an infinite loop could occur in the the madvise(2) implementation in the Linux kernel in certain circumstances. A local attacker could use this to cause a denial of service (system hang). (CVE-2017-18208) Andy Lutomirski discovered that the KVM implementation in the Linux kernel was vulnerable to a debug exception error when single-stepping through a syscall. A local attacker in a non-Linux guest vm could possibly use this to gain administrative privileges in the guest vm. (CVE-2017-7518) It was discovered that the Broadcom NetXtremeII ethernet driver in the Linux kernel did not properly validate Generic Segment Offload (GSO) packet sizes. An attacker could use this to cause a denial of service (interface unavailability). (CVE-2018-1000026) It was discovered that the Reliable Datagram Socket (RDS) implementation in the Linux kernel contained an out-of-bounds write during RDMA page allocation. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-5332) Mohamed Ghannam discovered a NULL pointer dereference in the RDS (Reliable Datagram Sockets) protocol implementation of the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-5333) Fan Long Fei discovered that a race condition existed in loop block device implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-5344) It was discovered that an integer overflow error existed in the futex implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-6927) It was discovered that a NULL pointer dereference existed in the RDS (Reliable Datagram Sockets) protocol implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-7492) It was discovered that the Broadcom UniMAC MDIO bus controller driver in the Linux kernel did not properly validate device resources. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-8043). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-07-30
    modified 2018-07-26
    plugin id 108842
    published 2018-04-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108842
    title Ubuntu 16.04 LTS : linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities (USN-3619-1)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2018-4017.NASL
    description Description of changes: [4.1.12-112.14.13.el7uek] - Revert 'kernel.spec: Require the new microcode_ctl.' (Brian Maly) [4.1.12-112.14.12.el7uek] - xen-blkback: add pending_req allocation stats (Ankur Arora) [Orabug: 27386890] - xen-blkback: move indirect req allocation out-of-line (Ankur Arora) [Orabug: 27386890] - xen-blkback: pull nseg validation out in a function (Ankur Arora) [Orabug: 27386890] - xen-blkback: make struct pending_req less monolithic (Ankur Arora) [Orabug: 27386890] - x86: Clean up IBRS functionality resident in common code (Kanth Ghatraju) [Orabug: 27403317] - x86: Display correct settings for the SPECTRE_V2 bug (Kanth Ghatraju) [Orabug: 27403317] - Set CONFIG_GENERIC_CPU_VULNERABILITIES flag (Kanth Ghatraju) [Orabug: 27403317] - x86/cpu: Implement CPU vulnerabilites sysfs functions (Thomas Gleixner) [Orabug: 27403317] - sysfs/cpu: Fix typos in vulnerability documentation (David Woodhouse) [Orabug: 27403317] - sysfs/cpu: Add vulnerability folder (Thomas Gleixner) [Orabug: 27403317] - x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] (David Woodhouse) [Orabug: 27403317] - x86/cpufeatures: Add X86_BUG_CPU_MELTDOWN (Kanth Ghatraju) [Orabug: 27403317] - KVM: x86: Add memory barrier on vmcs field lookup (Andrew Honig) {CVE-2017-5753} - KVM: VMX: remove I/O port 0x80 bypass on Intel hosts (Andrew Honig) [Orabug: 27402301] {CVE-2017-1000407} {CVE-2017-1000407} - xfs: give all workqueues rescuer threads (Chris Mason) [Orabug: 27397568] - ixgbevf: handle mbox_api_13 in ixgbevf_change_mtu (Joao Martins) [Orabug: 27397001]
    last seen 2018-07-30
    modified 2018-07-24
    plugin id 106225
    published 2018-01-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=106225
    title Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4017) (Spectre)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3617-2.NASL
    description USN-3617-1 fixed vulnerabilities in the Linux kernel for Ubuntu 17.10. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 17.10 for Ubuntu 16.04 LTS. It was discovered that a race condition leading to a use-after-free vulnerability existed in the ALSA PCM subsystem of the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-0861) It was discovered that the KVM implementation in the Linux kernel allowed passthrough of the diagnostic I/O port 0x80. An attacker in a guest VM could use this to cause a denial of service (system crash) in the host OS. (CVE-2017-1000407) It was discovered that a use-after-free vulnerability existed in the network namespaces implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-15129) Andrey Konovalov discovered that the usbtest device driver in the Linux kernel did not properly validate endpoint metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16532) Andrey Konovalov discovered that the SoundGraph iMON USB driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16537) Andrey Konovalov discovered that the IMS Passenger Control Unit USB driver in the Linux kernel did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16645) Andrey Konovalov discovered that the DiBcom DiB0700 USB DVB driver in the Linux kernel did not properly handle detach events. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16646) Andrey Konovalov discovered that the ASIX Ethernet USB driver in the Linux kernel did not properly handle suspend and resume events. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16647) Andrey Konovalov discovered that the CDC USB Ethernet driver did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16649) Andrey Konovalov discovered that the QMI WWAN USB driver did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16650) It was discovered that the HugeTLB component of the Linux kernel did not properly handle holes in hugetlb ranges. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2017-16994) It was discovered that the netfilter component of the Linux did not properly restrict access to the connection tracking helpers list. A local attacker could use this to bypass intended access restrictions. (CVE-2017-17448) It was discovered that the netfilter passive OS fingerprinting (xt_osf) module did not properly perform access control checks. A local attacker could improperly modify the system-wide OS fingerprint list. (CVE-2017-17450) Dmitry Vyukov discovered that the KVM implementation in the Linux kernel contained an out-of-bounds read when handling memory-mapped I/O. A local attacker could use this to expose sensitive information. (CVE-2017-17741) It was discovered that the Salsa20 encryption algorithm implementations in the Linux kernel did not properly handle zero-length inputs. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-17805) It was discovered that the HMAC implementation did not validate the state of the underlying cryptographic hash algorithm. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-17806) It was discovered that the keyring implementation in the Linux kernel did not properly check permissions when a key request was performed on a tasks' default keyring. A local attacker could use this to add keys to unauthorized keyrings. (CVE-2017-17807) It was discovered that a race condition existed in the OCFS2 file system implementation in the Linux kernel. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2017-18204) It was discovered that the Broadcom NetXtremeII ethernet driver in the Linux kernel did not properly validate Generic Segment Offload (GSO) packet sizes. An attacker could use this to cause a denial of service (interface unavailability). (CVE-2018-1000026) It was discovered that the Reliable Datagram Socket (RDS) implementation in the Linux kernel contained an out-of-bounds during RDMA page allocation. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-5332) Mohamed Ghannam discovered a NULL pointer dereference in the RDS (Reliable Datagram Sockets) protocol implementation of the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-5333) Fan Long Fei discovered that a race condition existed in loop block device implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-5344). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-04-06
    modified 2018-04-04
    plugin id 108835
    published 2018-04-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108835
    title Ubuntu 16.04 LTS : linux-hwe, linux-gcp, linux-oem vulnerabilities (USN-3617-2)
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2018-1026.NASL
    description According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel before 4.13.11 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages.(CVE-2017-16939) - The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.(CVE-2017-12190) - The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.13.11 mishandles node splitting, which allows local users to cause a denial of service (NULL pointer dereference and panic) via a crafted application, as demonstrated by the keyring key type, and key addition and link creation operations.(CVE-2017-12193) - The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.(CVE-2017-7542) - The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel before 3.19 does not ensure that an l2cap socket is available, which allows local users to gain privileges via a crafted application.(CVE-2017-15868) - The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.(CVE-2017-8824) - net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.(CVE-2017-17448) - The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.(CVE-2017-17449) - net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.(CVE-2017-17450) - The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allows local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device.(CVE-2017-17558) - The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.(CVE-2017-17805) - The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.(CVE-2017-17806) - he KEYS subsystem in the Linux kernel before 4.14.6 omitted an access-control check when adding a key to the current task's 'default request-key keyring' via the request_key() system call, allowing a local user to use a sequence of crafted system calls to add keys to a keyring with only Search permission (not Write permission) to that keyring, related to construct_get_dest_keyring() in security/keys/request_key.c.(CVE-2017-17807) - The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.(CVE-2017-1000407) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-08-11
    modified 2018-08-10
    plugin id 106167
    published 2018-01-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=106167
    title EulerOS 2.0 SP2 : kernel (EulerOS-SA-2018-1026)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3583-1.NASL
    description It was discovered that an out-of-bounds write vulnerability existed in the Flash-Friendly File System (f2fs) in the Linux kernel. An attacker could construct a malicious file system that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-0750) It was discovered that a race condition leading to a use-after-free vulnerability existed in the ALSA PCM subsystem of the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-0861) It was discovered that the KVM implementation in the Linux kernel allowed passthrough of the diagnostic I/O port 0x80. An attacker in a guest VM could use this to cause a denial of service (system crash) in the host OS. (CVE-2017-1000407) Bo Zhang discovered that the netlink wireless configuration interface in the Linux kernel did not properly validate attributes when handling certain requests. A local attacker with the CAP_NET_ADMIN could use this to cause a denial of service (system crash). (CVE-2017-12153) Vitaly Mayatskikh discovered that the SCSI subsystem in the Linux kernel did not properly track reference counts when merging buffers. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2017-12190) It was discovered that the key management subsystem in the Linux kernel did not properly restrict key reads on negatively instantiated keys. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-12192) It was discovered that an integer overflow existed in the sysfs interface for the QLogic 24xx+ series SCSI driver in the Linux kernel. A local privileged attacker could use this to cause a denial of service (system crash). (CVE-2017-14051) Otto Ebeling discovered that the memory manager in the Linux kernel did not properly check the effective UID in some situations. A local attacker could use this to expose sensitive information. (CVE-2017-14140) It was discovered that the ATI Radeon framebuffer driver in the Linux kernel did not properly initialize a data structure returned to user space. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2017-14156) ChunYu Wang discovered that the iSCSI transport implementation in the Linux kernel did not properly validate data structures. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-14489) James Patrick-Evans discovered a race condition in the LEGO USB Infrared Tower driver in the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-15102) ChunYu Wang discovered that a use-after-free vulnerability existed in the SCTP protocol implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code, (CVE-2017-15115) It was discovered that the key management subsystem in the Linux kernel did not properly handle NULL payloads with non-zero length values. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-15274) It was discovered that the Bluebooth Network Encapsulation Protocol (BNEP) implementation in the Linux kernel did not validate the type of socket passed in the BNEPCONNADD ioctl(). A local attacker with the CAP_NET_ADMIN privilege could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-15868) Andrey Konovalov discovered a use-after-free vulnerability in the USB serial console driver in the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16525) It was discovered that the netfilter passive OS fingerprinting (xt_osf) module did not properly perform access control checks. A local attacker could improperly modify the systemwide OS fingerprint list. (CVE-2017-17450) It was discovered that the HMAC implementation did not validate the state of the underlying cryptographic hash algorithm. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-17806) Denys Fedoryshchenko discovered a use-after-free vulnerability in the netfilter xt_TCPMSS filter of the Linux kernel. A remote attacker could use this to cause a denial of service (system crash). (CVE-2017-18017) Gareth Evans discovered that the shm IPC subsystem in the Linux kernel did not properly restrict mapping page zero. A local privileged attacker could use this to execute arbitrary code. (CVE-2017-5669) It was discovered that an integer overflow vulnerability existing in the IPv6 implementation in the Linux kernel. A local attacker could use this to cause a denial of service (infinite loop). (CVE-2017-7542) Tommi Rantala and Brad Spengler discovered that the memory manager in the Linux kernel did not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism. A local attacker with access to /dev/mem could use this to expose sensitive information or possibly execute arbitrary code. (CVE-2017-7889) Mohamed Ghannam discovered a use-after-free vulnerability in the DCCP protocol implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-8824) Mohamed Ghannam discovered a NULL pointer dereference in the RDS (Reliable Datagram Sockets) protocol implementation of the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-5333) Fan Long Fei discovered that a race condition existed in loop block device implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-5344) USN-3524-1 mitigated CVE-2017-5754 (Meltdown) for the amd64 architecture in Ubuntu 14.04 LTS. This update provides the corresponding mitigations for the ppc64el architecture. Original advisory details : Jann Horn discovered that microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized memory reads via sidechannel attacks. This flaw is known as Meltdown. A local attacker could use this to expose sensitive information, including kernel memory. (CVE-2017-5754). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-08-10
    modified 2018-08-06
    plugin id 107003
    published 2018-02-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107003
    title Ubuntu 14.04 LTS : linux vulnerabilities (USN-3583-1) (Meltdown)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2018-1062.NASL
    description An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * hw: cpu: speculative execution permission faults handling (CVE-2017-5754, Important, KVM for Power) * kernel: Buffer overflow in firewire driver via crafted incoming packets (CVE-2016-8633, Important) * kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824, Important) * Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register (CVE-2017-12154, Important) * kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166, Important) * kernel: media: use-after-free in [tuner-xc2028] media driver (CVE-2016-7913, Moderate) * kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() (CVE-2017-7294, Moderate) * kernel: Incorrect type conversion for size during dma allocation (CVE-2017-9725, Moderate) * kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190, Moderate) * kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121, Moderate) * kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c (CVE-2017-15126, Moderate) * kernel: net: double-free and memory corruption in get_net_ns_by_id() (CVE-2017-15129, Moderate) * kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265, Moderate) * kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure (CVE-2017-17448, Moderate) * kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity (CVE-2017-17449, Moderate) * kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow (CVE-2017-17558, Moderate) * kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/ netfilter/xt_TCPMSS.c (CVE-2017-18017, Moderate) * kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203, Moderate) * kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ (CVE-2017-1000252, Moderate) * Kernel: KVM: DoS via write flood to I/O port 0x80 (CVE-2017-1000407, Moderate) * kernel: Stack information leak in the EFS element (CVE-2017-1000410, Moderate) * kernel: Kernel address information leak in drivers/acpi/ sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass (CVE-2018-5750, Moderate) * kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004, Moderate) * kernel: multiple Low security impact security issues (CVE-2016-3672, CVE-2017-14140, CVE-2017-15116, CVE-2017-15127, CVE-2018-6927, Low) Red Hat would like to thank Eyal Itkin for reporting CVE-2016-8633; Google Project Zero for reporting CVE-2017-5754; Mohamed Ghannam for reporting CVE-2017-8824; Jim Mattson (Google.com) for reporting CVE-2017-12154; Vitaly Mayatskih for reporting CVE-2017-12190; Andrea Arcangeli (Engineering) for reporting CVE-2017-15126; Kirill Tkhai for reporting CVE-2017-15129; Jan H. Schonherr (Amazon) for reporting CVE-2017-1000252; and Armis Labs for reporting CVE-2017-1000410. The CVE-2017-15121 issue was discovered by Miklos Szeredi (Red Hat) and the CVE-2017-15116 issue was discovered by ChunYu Wang (Red Hat). For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.5 Release Notes linked from the References section.
    last seen 2018-04-12
    modified 2018-04-11
    plugin id 108997
    published 2018-04-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108997
    title RHEL 7 : kernel (RHSA-2018:1062)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2018-1062.NASL
    description An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * hw: cpu: speculative execution permission faults handling (CVE-2017-5754, Important, KVM for Power) * kernel: Buffer overflow in firewire driver via crafted incoming packets (CVE-2016-8633, Important) * kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824, Important) * Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register (CVE-2017-12154, Important) * kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166, Important) * kernel: media: use-after-free in [tuner-xc2028] media driver (CVE-2016-7913, Moderate) * kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() (CVE-2017-7294, Moderate) * kernel: Incorrect type conversion for size during dma allocation (CVE-2017-9725, Moderate) * kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190, Moderate) * kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121, Moderate) * kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c (CVE-2017-15126, Moderate) * kernel: net: double-free and memory corruption in get_net_ns_by_id() (CVE-2017-15129, Moderate) * kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265, Moderate) * kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure (CVE-2017-17448, Moderate) * kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity (CVE-2017-17449, Moderate) * kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow (CVE-2017-17558, Moderate) * kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/ netfilter/xt_TCPMSS.c (CVE-2017-18017, Moderate) * kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203, Moderate) * kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ (CVE-2017-1000252, Moderate) * Kernel: KVM: DoS via write flood to I/O port 0x80 (CVE-2017-1000407, Moderate) * kernel: Stack information leak in the EFS element (CVE-2017-1000410, Moderate) * kernel: Kernel address information leak in drivers/acpi/ sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass (CVE-2018-5750, Moderate) * kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004, Moderate) * kernel: multiple Low security impact security issues (CVE-2016-3672, CVE-2017-14140, CVE-2017-15116, CVE-2017-15127, CVE-2018-6927, Low) Red Hat would like to thank Eyal Itkin for reporting CVE-2016-8633; Google Project Zero for reporting CVE-2017-5754; Mohamed Ghannam for reporting CVE-2017-8824; Jim Mattson (Google.com) for reporting CVE-2017-12154; Vitaly Mayatskih for reporting CVE-2017-12190; Andrea Arcangeli (Engineering) for reporting CVE-2017-15126; Kirill Tkhai for reporting CVE-2017-15129; Jan H. Schonherr (Amazon) for reporting CVE-2017-1000252; and Armis Labs for reporting CVE-2017-1000410. The CVE-2017-15121 issue was discovered by Miklos Szeredi (Red Hat) and the CVE-2017-15116 issue was discovered by ChunYu Wang (Red Hat). For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.5 Release Notes linked from the References section.
    last seen 2018-04-28
    modified 2018-04-27
    plugin id 109380
    published 2018-04-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=109380
    title CentOS 7 : kernel (CESA-2018:1062)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-1200.NASL
    description Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. CVE-2016-10208 Sergej Schumilo and Ralf Spenneberg discovered that a crafted ext4 filesystem could trigger memory corruption when it is mounted. A user that can provide a device or filesystem image to be mounted could use this for denial of service (crash or data corruption) or possibly for privilege escalation. CVE-2017-8824 Mohamed Ghannam discovered that the DCCP implementation did not correctly manage resources when a socket is disconnected and reconnected, potentially leading to a use-after-free. A local user could use this for denial of service (crash or data corruption) or possibly for privilege escalation. On systems that do not already have the dccp module loaded, this can be mitigated by disabling it: echo >> /etc/modprobe.d/disable-dccp.conf install dccp false CVE-2017-8831 Pengfei Wang discovered that the saa7164 video capture driver re-reads data from a PCI device after validating it. A physically present user able to attach a specially designed PCI device could use this for privilege escalation. CVE-2017-12190 Vitaly Mayatskikh discovered that the block layer did not correctly count page references for raw I/O from user-space. This can be exploited by a guest VM with access to a host SCSI device for denial of service (memory exhaustion) or potentially for privilege escalation. CVE-2017-13080 A vulnerability was found in the WPA2 protocol that could lead to reinstallation of the same Group Temporal Key (GTK), which substantially reduces the security of wifi encryption. This is one of the issues collectively known as 'KRACK'. Updates to GTKs are usually handled by the wpa package, where this issue was already fixed (DLA-1150-1). However, some wifi devices can remain active and update GTKs autonomously while the system is suspended. The kernel must also check for and ignore key reinstallation. CVE-2017-14051 'shqking' reported that the qla2xxx SCSI host driver did not correctly validate I/O to the 'optrom' sysfs attribute of the devices it creates. This is unlikely to have any security impact. CVE-2017-15115 Vladis Dronov reported that the SCTP implementation did not correctly handle 'peel-off' of an association to another net namespace. This leads to a use-after-free, which a local user can exploit for denial of service (crash or data corruption) or possibly for privilege escalation. On systems that do not already have the sctp module loaded, this can be mitigated by disabling it: echo >> /etc/modprobe.d/disable-sctp.conf install sctp false CVE-2017-15265 Michael23 Yu reported a race condition in the ALSA sequencer subsystem involving creation and deletion of ports, which could lead to a use-after-free. A local user with access to an ALSA sequencer device can use this for denial of service (crash or data loss) or possibly for privilege escalation. CVE-2017-15299 Eric Biggers discovered that the KEYS subsystem did not correctly handle update of an uninstantiated key, leading to a null dereference. A local user can use this for denial of service (crash). CVE-2017-15649 'nixioaming' reported a race condition in the packet socket (AF_PACKET) implementation involving rebinding to a fanout group, which could lead to a use-after-free. A local user with the CAP_NET_RAW capability can use this for denial of service (crash or data corruption) or possibly for privilege escalation. CVE-2017-15868 Al Viro found that the Bluebooth Network Encapsulation Protocol (BNEP) implementation did not validate the type of the second socket passed to the BNEPCONNADD ioctl(), which could lead to memory corruption. A local user with the CAP_NET_ADMIN capability can use this for denial of service (crash or data corruption) or possibly for privilege escalation. CVE-2017-16525 Andrey Konovalov reported that the USB serial console implementation did not correctly handle disconnection of unusual serial devices, leading to a use-after-free. A similar issue was found in the case where setup of a serial console fails. A physically present user with a specially designed USB device can use this to cause a denial of service (crash or data corruption) or possibly for privilege escalation. CVE-2017-16527 Andrey Konovalov reported that the USB sound mixer driver did not correctly cancel I/O in case it failed to probe a device, which could lead to a use-after-free. A physically present user with a specially designed USB device can use this to cause a denial of service (crash or data corruption) or possibly for privilege escalation. CVE-2017-16529 Andrey Konovalov reported that the USB sound driver did not fully validate descriptor lengths, which could lead to a buffer over-read. A physically present user with a specially designed USB device may be able to use this to cause a denial of service (crash). CVE-2017-16531 Andrey Konovalov reported that the USB core did not validate IAD lengths, which could lead to a buffer over-read. A physically present user with a specially designed USB device may be able to use this to cause a denial of service (crash). CVE-2017-16532 Andrey Konovalov reported that the USB test driver did not correctly handle devices with specific combinations of endpoints. A physically present user with a specially designed USB device can use this to cause a denial of service (crash). CVE-2017-16533 Andrey Konovalov reported that the USB HID driver did not fully validate descriptor lengths, which could lead to a buffer over-read. A physically present user with a specially designed USB device may be able to use this to cause a denial of service (crash). CVE-2017-16535 Andrey Konovalov reported that the USB core did not validate BOS descriptor lengths, which could lead to a buffer over-read. A physically present user with a specially designed USB device may be able to use this to cause a denial of service (crash). CVE-2017-16536 Andrey Konovalov reported that the cx231xx video capture driver did not fully validate the device endpoint configuration, which could lead to a null dereference. A physically present user with a specially designed USB device can use this to cause a denial of service (crash). CVE-2017-16537 Andrey Konovalov reported that the imon RC driver did not fully validate the device interface configuration, which could lead to a null dereference. A physically present user with a specially designed USB device can use this to cause a denial of service (crash). CVE-2017-16643 Andrey Konovalov reported that the gtco tablet driver did not fully validate descriptor lengths, which could lead to a buffer over-read. A physically present user with a specially designed USB device may be able to use this to cause a denial of service (crash). CVE-2017-16649 Bjørn Mork found that the cdc_ether network driver did not validate the device's maximum segment size, potentially leading to a division by zero. A physically present user with a specially designed USB device can use this to cause a denial of service (crash). CVE-2017-16939 Mohamed Ghannam reported (through Beyond Security's SecuriTeam Secure Disclosure program) that the IPsec (xfrm) implementation did not correctly handle some failure cases when dumping policy information through netlink. A local user with the CAP_NET_ADMIN capability can use this for denial of service (crash or data corruption) or possibly for privilege escalation. CVE-2017-1000407 Andrew Honig reported that the KVM implementation for Intel processors allowed direct access to host I/O port 0x80, which is not generally safe. On some systems this allows a guest VM to cause a denial of service (crash) of the host. For Debian 7 'Wheezy', these problems have been fixed in version 3.2.96-2. This version also includes bug fixes from upstream versions up to and including 3.2.96. It also fixes some regressions caused by the fix for CVE-2017-1000364, which was included in DLA-993-1. We recommend that you upgrade your linux packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-07-07
    modified 2018-07-06
    plugin id 105116
    published 2017-12-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105116
    title Debian DLA-1200-1 : linux security update (KRACK)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3617-1.NASL
    description It was discovered that a race condition leading to a use-after-free vulnerability existed in the ALSA PCM subsystem of the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-0861) It was discovered that the KVM implementation in the Linux kernel allowed passthrough of the diagnostic I/O port 0x80. An attacker in a guest VM could use this to cause a denial of service (system crash) in the host OS. (CVE-2017-1000407) It was discovered that a use-after-free vulnerability existed in the network namespaces implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-15129) Andrey Konovalov discovered that the usbtest device driver in the Linux kernel did not properly validate endpoint metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16532) Andrey Konovalov discovered that the SoundGraph iMON USB driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16537) Andrey Konovalov discovered that the IMS Passenger Control Unit USB driver in the Linux kernel did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16645) Andrey Konovalov discovered that the DiBcom DiB0700 USB DVB driver in the Linux kernel did not properly handle detach events. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16646) Andrey Konovalov discovered that the ASIX Ethernet USB driver in the Linux kernel did not properly handle suspend and resume events. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16647) Andrey Konovalov discovered that the CDC USB Ethernet driver did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16649) Andrey Konovalov discovered that the QMI WWAN USB driver did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16650) It was discovered that the HugeTLB component of the Linux kernel did not properly handle holes in hugetlb ranges. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2017-16994) It was discovered that the netfilter component of the Linux did not properly restrict access to the connection tracking helpers list. A local attacker could use this to bypass intended access restrictions. (CVE-2017-17448) It was discovered that the netfilter passive OS fingerprinting (xt_osf) module did not properly perform access control checks. A local attacker could improperly modify the system-wide OS fingerprint list. (CVE-2017-17450) Dmitry Vyukov discovered that the KVM implementation in the Linux kernel contained an out-of-bounds read when handling memory-mapped I/O. A local attacker could use this to expose sensitive information. (CVE-2017-17741) It was discovered that the Salsa20 encryption algorithm implementations in the Linux kernel did not properly handle zero-length inputs. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-17805) It was discovered that the HMAC implementation did not validate the state of the underlying cryptographic hash algorithm. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-17806) It was discovered that the keyring implementation in the Linux kernel did not properly check permissions when a key request was performed on a tasks' default keyring. A local attacker could use this to add keys to unauthorized keyrings. (CVE-2017-17807) It was discovered that a race condition existed in the OCFS2 file system implementation in the Linux kernel. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2017-18204) It was discovered that the Broadcom NetXtremeII ethernet driver in the Linux kernel did not properly validate Generic Segment Offload (GSO) packet sizes. An attacker could use this to cause a denial of service (interface unavailability). (CVE-2018-1000026) It was discovered that the Reliable Datagram Socket (RDS) implementation in the Linux kernel contained an out-of-bounds during RDMA page allocation. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-5332) Mohamed Ghannam discovered a NULL pointer dereference in the RDS (Reliable Datagram Sockets) protocol implementation of the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-5333) Fan Long Fei discovered that a race condition existed in loop block device implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-5344). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-04-06
    modified 2018-04-04
    plugin id 108834
    published 2018-04-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108834
    title Ubuntu 17.10 : linux vulnerabilities (USN-3617-1)
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2017-937.NASL
    description A flaw was found in the patches used to fix the 'dirtycow' vulnerability (CVE-2016-5195). An attacker, able to run local code, can exploit a race condition in transparent huge pages to modify usually read-only huge pages. (CVE-2017-1000405) Linux kernel Virtualization Module (CONFIG_KVM) for the Intel processor family (CONFIG_KVM_INTEL) is vulnerable to a DoS issue. It could occur if a guest was to flood the I/O port 0x80 with write requests. A guest user could use this flaw to crash the host kernel resulting in DoS. (CVE-2017-1000407) A BUG in drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device. (CVE-2017-16647) A BUG in drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device. (CVE-2017-16646) The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device. (CVE-2017-16645) The parse_hid_report_descriptor function in drivers/input/tablet/gtco.c in the Linux kernel before 4.13.11 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device. (CVE-2017-16643) The walk_hugetlb_range() function in 'mm/pagewalk.c' file in the Linux kernel from v4.0-rc1 through v4.15-rc1 mishandles holes in hugetlb ranges. This allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call. (CVE-2017-16994) The qmi_wwan_bind function in drivers/net/usb/qmi_wwan.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device. (CVE-2017-16650) The usbnet_generic_cdc_bind function in drivers/net/usb/cdc_ether.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device. (CVE-2017-16649) A vulnerability was found in the Linux kernel when peeling off an association to the socket in another network namespace. All transports in this association are not to be rehashed and keep using the old key in hashtable, thus removing transports from hashtable when closing the socket, all transports are being freed. Later on a use-after-free issue could be caused when looking up an association and dereferencing the transports. (CVE-2017-15115)
    last seen 2018-04-19
    modified 2018-04-18
    plugin id 105422
    published 2017-12-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=105422
    title Amazon Linux AMI : kernel (ALAS-2017-937) (Dirty COW)
  • NASL family PhotonOS Local Security Checks
    NASL id PHOTONOS_PHSA-2017-2_0-0008.NASL
    description An update of 'binutils', 'linux', 'wget' packages of Photon OS has been released.
    last seen 2018-08-18
    modified 2018-08-17
    plugin id 111906
    published 2018-08-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111906
    title Photon OS 2.0: Binutils / Linux / Wget PHSA-2017-2.0-0008
  • NASL family PhotonOS Local Security Checks
    NASL id PHOTONOS_PHSA-2017-1_0-0095.NASL
    description An update of 'curl', 'docker', 'binutils', 'linux','rpm' packages of Photon OS has been released.
    last seen 2018-08-18
    modified 2018-08-17
    plugin id 111904
    published 2018-08-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111904
    title Photon OS 1.0: Binutils / Curl / Docker / Linux / Rpm PHSA-2017-1.0-0095
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2018-4071.NASL
    description The remote Oracle Linux host is missing a security update for the Unbreakable Enterprise kernel package(s).
    last seen 2018-08-05
    modified 2018-08-03
    plugin id 109156
    published 2018-04-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=109156
    title Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4071) (Dirty COW) (Meltdown) (Spectre)
redhat via4
advisories
  • rhsa
    id RHSA-2018:0676
  • rhsa
    id RHSA-2018:1062
rpms
  • kernel-rt-0:3.10.0-862.rt56.804.el7
  • kernel-rt-debug-0:3.10.0-862.rt56.804.el7
  • kernel-rt-debug-devel-0:3.10.0-862.rt56.804.el7
  • kernel-rt-debug-kvm-0:3.10.0-862.rt56.804.el7
  • kernel-rt-devel-0:3.10.0-862.rt56.804.el7
  • kernel-rt-doc-0:3.10.0-862.rt56.804.el7
  • kernel-rt-kvm-0:3.10.0-862.rt56.804.el7
  • kernel-rt-trace-0:3.10.0-862.rt56.804.el7
  • kernel-rt-trace-devel-0:3.10.0-862.rt56.804.el7
  • kernel-rt-trace-kvm-0:3.10.0-862.rt56.804.el7
  • kernel-0:3.10.0-862.el7
  • kernel-abi-whitelists-0:3.10.0-862.el7
  • kernel-bootwrapper-0:3.10.0-862.el7
  • kernel-debug-0:3.10.0-862.el7
  • kernel-debug-devel-0:3.10.0-862.el7
  • kernel-devel-0:3.10.0-862.el7
  • kernel-doc-0:3.10.0-862.el7
  • kernel-headers-0:3.10.0-862.el7
  • kernel-kdump-0:3.10.0-862.el7
  • kernel-kdump-devel-0:3.10.0-862.el7
  • kernel-tools-0:3.10.0-862.el7
  • kernel-tools-libs-0:3.10.0-862.el7
  • kernel-tools-libs-devel-0:3.10.0-862.el7
  • perf-0:3.10.0-862.el7
  • python-perf-0:3.10.0-862.el7
refmap via4
bid 102038
confirm https://access.redhat.com/security/cve/cve-2017-1000407
debian
  • DSA-4073
  • DSA-4082
mlist
  • [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
  • [kvm] 20171201 [PATCH 1/2] KVM: VMX: remove I/O port 0x80 bypass on Intel hosts
  • [oss-security] 20171204 CVE-2017-1000407 Kernel: KVM: DoS via write flood to I/O port 0x80
ubuntu
  • USN-3583-1
  • USN-3583-2
  • USN-3617-1
  • USN-3617-2
  • USN-3619-1
  • USN-3619-2
  • USN-3632-1
Last major update 11-12-2017 - 16:29
Published 11-12-2017 - 16:29
Last modified 24-04-2018 - 21:29
Back to Top