BDU:2019-02196
Vulnerability from fstec - Published: 15.06.2019
VLAI Severity ?
Title
Уязвимость ядра операционной системы Linux, вызванная ошибками при обработке сегментов минимального размера, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость ядра операционной системы Linux вызвана ошибками при обработке сегментов минимального размера. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, вызвать отказ в обслуживании посредством отправки специально сформированной последовательности TCP-пакетов
Severity ?
Vendor
Red Hat Inc., Siemens AG, АО «ИВК», Oracle Corp., Novell Inc., ООО «Открытая мобильная платформа», Сообщество свободного программного обеспечения
Software Name
Red Hat Enterprise Linux, Red Hat Virtualization, Red Hat Enterprise MRG, TIM 1531 IRC, SIMATIC RF188C, SIMATIC RF600R, SIMATIC RF185C, SIMATIC RF186C, SIMATIC Teleservice Adapter IE Advanced, SIMATIC Teleservice Adapter IE Basic, Альт 8 СП Рабочая станция, Enterprise Communications Broker, OpenSUSE Leap, SINUMERIK 828D, SIMATIC CM 1542-1, SIMATIC CP 1242-7, SIMATIC CP 1243-1, SIMATIC CP 1243-7 LTE EU, SIMATIC CP 1243-7 LTE/US, SIMATIC CP 1243-8 IRC, SIMATIC CM 1542SP-1, SIMATIC CP 1543-1, SIMATIC CP 1543SP-1, CloudConnect 712, RUGGEDCOM RM1224, SCALANCE M800, SCALANCE M875, SCALANCE S615, SCALANCE SC-600, SCALANCE W-700, SCALANCE W1700, SCALANCE WLC711, SCALANCE WLC712, SIMATIC ITC1500, SIMATIC ITC1500 PRO, SIMATIC ITC1900, SIMATIC ITC2200 PRO, SIMATIC ITC2200, SIMATIC MV500, SIMATIC RF166C, SIMATIC RF186CI, SIMATIC RF188CI, SINUMERIK 808D, SINEMA Remote Connect Server, SIMATIC CP 1542SP-1 IRC, SIMATIC ITC1900 PRO, SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP, Siemens Sinumerik 840D sl, ROX II, Oracle Communications Session Border Controller, Oracle Enterprise Session Border Controller, Oracle Communications Session Router, Oracle Communications Subscriber-Aware Load Balancer, ОС Аврора (запись в едином реестре российских программ №1543), Linux
Software Version
5 (Red Hat Enterprise Linux), 6 (Red Hat Enterprise Linux), 7 (Red Hat Enterprise Linux), 4 (Red Hat Virtualization), 2.0 (Red Hat Enterprise MRG), - (TIM 1531 IRC), - (SIMATIC RF188C), - (SIMATIC RF600R), - (SIMATIC RF185C), - (SIMATIC RF186C), - (SIMATIC Teleservice Adapter IE Advanced), - (SIMATIC Teleservice Adapter IE Basic), - (Альт 8 СП Рабочая станция), PCz3.0 (Enterprise Communications Broker), 8 (Red Hat Enterprise Linux), 15.0 (OpenSUSE Leap), 15.1 (OpenSUSE Leap), 7.4 EUS (Red Hat Enterprise Linux), 7.5 EUS (Red Hat Enterprise Linux), до V4.8 SP5 (SINUMERIK 828D), - (SIMATIC CM 1542-1), - (SIMATIC CP 1242-7), - (SIMATIC CP 1243-1), - (SIMATIC CP 1243-7 LTE EU), - (SIMATIC CP 1243-7 LTE/US), - (SIMATIC CP 1243-8 IRC), - (SIMATIC CM 1542SP-1), - (SIMATIC CP 1543-1), - (SIMATIC CP 1543SP-1), до V1.1.5 (CloudConnect 712), - (RUGGEDCOM RM1224), - (SCALANCE M800), - (SCALANCE M875), - (SCALANCE S615), до V2.0.1 (SCALANCE SC-600), - (SCALANCE W-700), - (SCALANCE W1700), - (SCALANCE WLC711), - (SCALANCE WLC712), - (SIMATIC ITC1500), - (SIMATIC ITC1500 PRO), - (SIMATIC ITC1900), - (SIMATIC ITC2200 PRO), - (SIMATIC ITC2200), - (SIMATIC MV500), - (SIMATIC RF166C), - (SIMATIC RF186CI), - (SIMATIC RF188CI), до V4.92 (SINUMERIK 808D), до 2.0 SP1 (SINEMA Remote Connect Server), - (SIMATIC CP 1542SP-1 IRC), - (SIMATIC ITC1900 PRO), - (SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP), до V4.8 SP5 (Siemens Sinumerik 840D sl), - (ROX II), 7.2 Advanced Update Support (Red Hat Enterprise Linux), 7.2 Telco Extended Update Support (Red Hat Enterprise Linux), 6.5 Advanced Update Support (Red Hat Enterprise Linux), 6.6 Advanced Update Support (Red Hat Enterprise Linux), 7.2 Update Services for SAP Solutions (Red Hat Enterprise Linux), PCz3.1 (Enterprise Communications Broker), PCz3.2 (Enterprise Communications Broker), 8.0 (Oracle Communications Session Border Controller), 8.1 (Oracle Communications Session Border Controller), 8.2 (Oracle Communications Session Border Controller), 8.3 (Oracle Communications Session Border Controller), 7.5 (Oracle Enterprise Session Border Controller), 8.0 (Oracle Enterprise Session Border Controller), 8.1 (Oracle Enterprise Session Border Controller), 8.2 (Oracle Enterprise Session Border Controller), 8.3 (Oracle Enterprise Session Border Controller), 7.4 (Oracle Communications Session Router), 8.0 (Oracle Communications Session Router), 8.1 (Oracle Communications Session Router), 8.2 (Oracle Communications Session Router), 7.4 (Oracle Communications Session Border Controller), 7.3 (Oracle Communications Subscriber-Aware Load Balancer), 8.1 (Oracle Communications Subscriber-Aware Load Balancer), 8.3 (Oracle Communications Subscriber-Aware Load Balancer), 7.3 Advanced Update Support (Red Hat Enterprise Linux), 7.3 Telco Extended Update Support (Red Hat Enterprise Linux), 7.3 Update Services for SAP Solutions (Red Hat Enterprise Linux), 4.2 (Red Hat Virtualization), 3.2.3.10 (ОС Аврора), от 4.0 до 4.4.181 включительно (Linux), от 4.5 до 4.9.181 включительно (Linux), от 4.10 до 4.14.126 включительно (Linux), от 4.15 до 4.19.51 включительно (Linux), от 4.20 до 5.1.10 включительно (Linux)
Possible Mitigations
Использование рекомендаций:
Для Linux:
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=5f3e2bf008c2221478101ee72f5cb4654b9fc363
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=967c05aee439e6e5d7d805e195b3a20ef5c433d6
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.127
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.52
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.182
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.182
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.11
Для Альт 8 СП:
https://cve.basealt.ru/
Для openSUSE:
https://www.suse.com/security/cve/CVE-2019-11479/
Для продуктов Oracle:
https://www.oracle.com/security-alerts/cpujan2020.html
Red Hat:
https://access.redhat.com/security/cve/CVE-2019-11479
Для CloudConnect 712 до V1.1.5:
https://support.industry.siemens.com/cs/ww/en/view/109769636
Для SCALANCE SC-600 до V2.0.1:
https://support.industry.siemens.com/cs/ww/en/view/109769665
Для SINEMA Remote Connect Server до V2.0 SP1:
https://support.industry.siemens.com/cs/ww/en/view/109770899
Для SCALANCE M875 до SCALANCE M876-4 или RUGGEDCOM RM1224
Для SINUMERIK 828D и SINUMERIK 840D sl до V4.8 SP5 обратитесь в центр технической поддержки
Для SINUMERIK 808D до V4.92 обратитесь в центр технической поддержки
Компенсирующие меры:
Ограничить доступ к сети
Применить концепцию глубокой защиты
Для ОС Аврора:
https://cve.omprussia.ru/bb6323
Reference
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.openwall.com/lists/oss-security/2019/07/06/3
http://www.openwall.com/lists/oss-security/2019/07/06/4
http://www.securityfocus.com/bid/108818
https://access.redhat.com/errata/RHSA-2019:1594
https://access.redhat.com/errata/RHSA-2019:1602
https://access.redhat.com/errata/RHSA-2019:1699
https://access.redhat.com/security/cve/CVE-2019-11479
https://access.redhat.com/security/vulnerabilities/tcpsack
https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf
https://cve.basealt.ru/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479
https://cve.omprussia.ru/bb6323
https://exchange.xforce.ibmcloud.com/vulnerabilities/162665
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=5f3e2bf008c2221478101ee72f5cb4654b9fc363
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=967c05aee439e6e5d7d805e195b3a20ef5c433d6
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193
https://kc.mcafee.com/corporate/index?page=content&id=SB10287
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.127
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.52
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.182
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.182
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.11
https://launchpad.net/bugs/1832286
https://nvd.nist.gov/vuln/detail/CVE-2019-11479
https://patchwork.ozlabs.org/patch/1117157/
https://patchwork.ozlabs.org/patch/1117158/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0008
https://security.netapp.com/advisory/ntap-20190625-0001/
https://support.f5.com/csp/article/K35421172
https://support.f5.com/csp/article/K35421172?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/notices/USN-4041-1
https://ubuntu.com/security/notices/USN-4041-2
https://usn.ubuntu.com/4041-1/
https://usn.ubuntu.com/4041-2/
https://usn.ubuntu.com/usn/usn-4041-1
https://usn.ubuntu.com/usn/usn-4041-2
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic
https://www.cve.org/CVERecord?id=CVE-2019-11479
https://www.kb.cert.org/vuls/id/905115
https://www.opennet.ru/openforum/vsluhforumID3/117645.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.suse.com/security/cve/CVE-2019-11479/
https://www.synology.com/security/advisory/Synology_SA_19_28
https://www.us-cert.gov/ics/advisories/icsa-19-253-03
https://www.us-cert.gov/ics/advisories/icsma-20-170-06
CWE
CWE-400, CWE-405, CWE-770
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., Siemens AG, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, Oracle Corp., Novell Inc., \u041e\u041e\u041e \u00ab\u041e\u0442\u043a\u0440\u044b\u0442\u0430\u044f \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u0430\u044f \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430\u00bb, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "5 (Red Hat Enterprise Linux), 6 (Red Hat Enterprise Linux), 7 (Red Hat Enterprise Linux), 4 (Red Hat Virtualization), 2.0 (Red Hat Enterprise MRG), - (TIM 1531 IRC), - (SIMATIC RF188C), - (SIMATIC RF600R), - (SIMATIC RF185C), - (SIMATIC RF186C), - (SIMATIC Teleservice Adapter IE Advanced), - (SIMATIC Teleservice Adapter IE Basic), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f \u0420\u0430\u0431\u043e\u0447\u0430\u044f \u0441\u0442\u0430\u043d\u0446\u0438\u044f), PCz3.0 (Enterprise Communications Broker), 8 (Red Hat Enterprise Linux), 15.0 (OpenSUSE Leap), 15.1 (OpenSUSE Leap), 7.4 EUS (Red Hat Enterprise Linux), 7.5 EUS (Red Hat Enterprise Linux), \u0434\u043e V4.8 SP5 (SINUMERIK 828D), - (SIMATIC CM 1542-1), - (SIMATIC CP 1242-7), - (SIMATIC CP 1243-1), - (SIMATIC CP 1243-7 LTE EU), - (SIMATIC CP 1243-7 LTE/US), - (SIMATIC CP 1243-8 IRC), - (SIMATIC CM 1542SP-1), - (SIMATIC CP 1543-1), - (SIMATIC CP 1543SP-1), \u0434\u043e V1.1.5 (CloudConnect 712), - (RUGGEDCOM RM1224), - (SCALANCE M800), - (SCALANCE M875), - (SCALANCE S615), \u0434\u043e V2.0.1 (SCALANCE SC-600), - (SCALANCE W-700), - (SCALANCE W1700), - (SCALANCE WLC711), - (SCALANCE WLC712), - (SIMATIC ITC1500), - (SIMATIC ITC1500 PRO), - (SIMATIC ITC1900), - (SIMATIC ITC2200 PRO), - (SIMATIC ITC2200), - (SIMATIC MV500), - (SIMATIC RF166C), - (SIMATIC RF186CI), - (SIMATIC RF188CI), \u0434\u043e V4.92 (SINUMERIK 808D), \u0434\u043e 2.0 SP1 (SINEMA Remote Connect Server), - (SIMATIC CP 1542SP-1 IRC), - (SIMATIC ITC1900 PRO), - (SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP), \u0434\u043e V4.8 SP5 (Siemens Sinumerik 840D sl), - (ROX II), 7.2 Advanced Update Support (Red Hat Enterprise Linux), 7.2 Telco Extended Update Support (Red Hat Enterprise Linux), 6.5 Advanced Update Support (Red Hat Enterprise Linux), 6.6 Advanced Update Support (Red Hat Enterprise Linux), 7.2 Update Services for SAP Solutions (Red Hat Enterprise Linux), PCz3.1 (Enterprise Communications Broker), PCz3.2 (Enterprise Communications Broker), 8.0 (Oracle Communications Session Border Controller), 8.1 (Oracle Communications Session Border Controller), 8.2 (Oracle Communications Session Border Controller), 8.3 (Oracle Communications Session Border Controller), 7.5 (Oracle Enterprise Session Border Controller), 8.0 (Oracle Enterprise Session Border Controller), 8.1 (Oracle Enterprise Session Border Controller), 8.2 (Oracle Enterprise Session Border Controller), 8.3 (Oracle Enterprise Session Border Controller), 7.4 (Oracle Communications Session Router), 8.0 (Oracle Communications Session Router), 8.1 (Oracle Communications Session Router), 8.2 (Oracle Communications Session Router), 7.4 (Oracle Communications Session Border Controller), 7.3 (Oracle Communications Subscriber-Aware Load Balancer), 8.1 (Oracle Communications Subscriber-Aware Load Balancer), 8.3 (Oracle Communications Subscriber-Aware Load Balancer), 7.3 Advanced Update Support (Red Hat Enterprise Linux), 7.3 Telco Extended Update Support (Red Hat Enterprise Linux), 7.3 Update Services for SAP Solutions (Red Hat Enterprise Linux), 4.2 (Red Hat Virtualization), 3.2.3.10 (\u041e\u0421 \u0410\u0432\u0440\u043e\u0440\u0430), \u043e\u0442 4.0 \u0434\u043e 4.4.181 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.5 \u0434\u043e 4.9.181 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.10 \u0434\u043e 4.14.126 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.15 \u0434\u043e 4.19.51 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.20 \u0434\u043e 5.1.10 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\n\u0414\u043b\u044f Linux:\nhttps://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=5f3e2bf008c2221478101ee72f5cb4654b9fc363\nhttps://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=967c05aee439e6e5d7d805e195b3a20ef5c433d6\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.127\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.52\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.182\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.182\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.11\n\n\u0414\u043b\u044f \u0410\u043b\u044c\u0442 8 \u0421\u041f:\nhttps://cve.basealt.ru/\n\n\u0414\u043b\u044f openSUSE:\nhttps://www.suse.com/security/cve/CVE-2019-11479/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Oracle:\nhttps://www.oracle.com/security-alerts/cpujan2020.html\n\nRed Hat:\nhttps://access.redhat.com/security/cve/CVE-2019-11479\n\n\u0414\u043b\u044f CloudConnect 712 \u0434\u043e V1.1.5:\nhttps://support.industry.siemens.com/cs/ww/en/view/109769636\n\n\u0414\u043b\u044f SCALANCE SC-600 \u0434\u043e V2.0.1:\nhttps://support.industry.siemens.com/cs/ww/en/view/109769665\n\n\u0414\u043b\u044f SINEMA Remote Connect Server \u0434\u043e V2.0 SP1:\nhttps://support.industry.siemens.com/cs/ww/en/view/109770899\n\n\u0414\u043b\u044f SCALANCE M875 \u0434\u043e SCALANCE M876-4 \u0438\u043b\u0438 RUGGEDCOM RM1224\n\n\u0414\u043b\u044f SINUMERIK 828D \u0438 SINUMERIK 840D sl \u0434\u043e V4.8 SP5 \u043e\u0431\u0440\u0430\u0442\u0438\u0442\u0435\u0441\u044c \u0432 \u0446\u0435\u043d\u0442\u0440 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438\n\n\u0414\u043b\u044f SINUMERIK 808D \u0434\u043e V4.92 \u043e\u0431\u0440\u0430\u0442\u0438\u0442\u0435\u0441\u044c \u0432 \u0446\u0435\u043d\u0442\u0440 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n\u041e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u0435\u0442\u0438\n\u041f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u043a\u043e\u043d\u0446\u0435\u043f\u0446\u0438\u044e \u0433\u043b\u0443\u0431\u043e\u043a\u043e\u0439 \u0437\u0430\u0449\u0438\u0442\u044b\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u0432\u0440\u043e\u0440\u0430:\nhttps://cve.omprussia.ru/bb6323",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "15.06.2019",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "29.05.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "21.06.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-02196",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-11479",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Red Hat Virtualization, Red Hat Enterprise MRG, TIM 1531 IRC, SIMATIC RF188C, SIMATIC RF600R, SIMATIC RF185C, SIMATIC RF186C, SIMATIC Teleservice Adapter IE Advanced, SIMATIC Teleservice Adapter IE Basic, \u0410\u043b\u044c\u0442 8 \u0421\u041f \u0420\u0430\u0431\u043e\u0447\u0430\u044f \u0441\u0442\u0430\u043d\u0446\u0438\u044f, Enterprise Communications Broker, OpenSUSE Leap, SINUMERIK 828D, SIMATIC CM 1542-1, SIMATIC CP 1242-7, SIMATIC CP 1243-1, SIMATIC CP 1243-7 LTE EU, SIMATIC CP 1243-7 LTE/US, SIMATIC CP 1243-8 IRC, SIMATIC CM 1542SP-1, SIMATIC CP 1543-1, SIMATIC CP 1543SP-1, CloudConnect 712, RUGGEDCOM RM1224, SCALANCE M800, SCALANCE M875, SCALANCE S615, SCALANCE SC-600, SCALANCE W-700, SCALANCE W1700, SCALANCE WLC711, SCALANCE WLC712, SIMATIC ITC1500, SIMATIC ITC1500 PRO, SIMATIC ITC1900, SIMATIC ITC2200 PRO, SIMATIC ITC2200, SIMATIC MV500, SIMATIC RF166C, SIMATIC RF186CI, SIMATIC RF188CI, SINUMERIK 808D, SINEMA Remote Connect Server, SIMATIC CP 1542SP-1 IRC, SIMATIC ITC1900 PRO, SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP, Siemens Sinumerik 840D sl, ROX II, Oracle Communications Session Border Controller, Oracle Enterprise Session Border Controller, Oracle Communications Session Router, Oracle Communications Subscriber-Aware Load Balancer, \u041e\u0421 \u0410\u0432\u0440\u043e\u0440\u0430 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161543), Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 5 , Red Hat Inc. Red Hat Enterprise Linux 6 , Red Hat Inc. Red Hat Enterprise Linux 7 , \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f \u0420\u0430\u0431\u043e\u0447\u0430\u044f \u0441\u0442\u0430\u043d\u0446\u0438\u044f - , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 4.4.182 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 4.9.182 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 4.14.127 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 4.19.52 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 5.1.11 , Red Hat Inc. Red Hat Enterprise Linux 8 , Novell Inc. OpenSUSE Leap 15.0 , Novell Inc. OpenSUSE Leap 15.1 , Red Hat Inc. Red Hat Enterprise Linux 7.4 EUS , Red Hat Inc. Red Hat Enterprise Linux 7.5 EUS , Red Hat Inc. Red Hat Enterprise Linux 7.2 Advanced Update Support , Red Hat Inc. Red Hat Enterprise Linux 7.2 Telco Extended Update Support , Red Hat Inc. Red Hat Enterprise Linux 6.5 Advanced Update Support , Red Hat Inc. Red Hat Enterprise Linux 6.6 Advanced Update Support , Red Hat Inc. Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions , Red Hat Inc. Red Hat Enterprise Linux 7.3 Advanced Update Support , Red Hat Inc. Red Hat Enterprise Linux 7.3 Telco Extended Update Support , Red Hat Inc. Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions , \u041e\u041e\u041e \u00ab\u041e\u0442\u043a\u0440\u044b\u0442\u0430\u044f \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u0430\u044f \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430\u00bb \u041e\u0421 \u0410\u0432\u0440\u043e\u0440\u0430 3.2.3.10 F+ Life Tab Plus (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161543)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u0432\u044b\u0437\u0432\u0430\u043d\u043d\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u0441\u0435\u0433\u043c\u0435\u043d\u0442\u043e\u0432 \u043c\u0438\u043d\u0438\u043c\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0440\u0430\u0437\u043c\u0435\u0440\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u044b\u0439 \u0440\u0430\u0441\u0445\u043e\u0434 \u0440\u0435\u0441\u0443\u0440\u0441\u0430 (\u00ab\u0418\u0441\u0442\u043e\u0449\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u00bb) (CWE-400), \u0410\u0441\u0438\u043c\u043c\u0435\u0442\u0440\u0438\u0447\u043d\u043e\u0435 \u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 (\u0423\u0441\u0438\u043b\u0435\u043d\u0438\u0435) (CWE-405), \u041d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u043e\u0435 \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 \u0438\u043b\u0438 \u0434\u0440\u043e\u0441\u0441\u0435\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 (CWE-770)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u0441\u0435\u0433\u043c\u0435\u043d\u0442\u043e\u0432 \u043c\u0438\u043d\u0438\u043c\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0440\u0430\u0437\u043c\u0435\u0440\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e\u043c \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u043f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 TCP-\u043f\u0430\u043a\u0435\u0442\u043e\u0432",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt\nhttp://www.openwall.com/lists/oss-security/2019/06/28/2\nhttp://www.openwall.com/lists/oss-security/2019/07/06/3\nhttp://www.openwall.com/lists/oss-security/2019/07/06/4\nhttp://www.securityfocus.com/bid/108818\nhttps://access.redhat.com/errata/RHSA-2019:1594\nhttps://access.redhat.com/errata/RHSA-2019:1602\nhttps://access.redhat.com/errata/RHSA-2019:1699\nhttps://access.redhat.com/security/cve/CVE-2019-11479\nhttps://access.redhat.com/security/vulnerabilities/tcpsack\nhttps://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf\nhttps://cve.basealt.ru/\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479\nhttps://cve.omprussia.ru/bb6323\nhttps://exchange.xforce.ibmcloud.com/vulnerabilities/162665\nhttps://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=5f3e2bf008c2221478101ee72f5cb4654b9fc363\nhttps://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=967c05aee439e6e5d7d805e195b3a20ef5c433d6\nhttps://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md\nhttps://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193\nhttps://kc.mcafee.com/corporate/index?page=content\u0026id=SB10287\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.127\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.52\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.182\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.182\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.11\nhttps://launchpad.net/bugs/1832286\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-11479\nhttps://patchwork.ozlabs.org/patch/1117157/\nhttps://patchwork.ozlabs.org/patch/1117158/\nhttps://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0008\nhttps://security.netapp.com/advisory/ntap-20190625-0001/\nhttps://support.f5.com/csp/article/K35421172\nhttps://support.f5.com/csp/article/K35421172?utm_source=f5support\u0026amp%3Butm_medium=RSS\nhttps://ubuntu.com/security/notices/USN-4041-1\nhttps://ubuntu.com/security/notices/USN-4041-2\nhttps://usn.ubuntu.com/4041-1/\nhttps://usn.ubuntu.com/4041-2/\nhttps://usn.ubuntu.com/usn/usn-4041-1\nhttps://usn.ubuntu.com/usn/usn-4041-2\nhttps://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic\nhttps://www.cve.org/CVERecord?id=CVE-2019-11479\nhttps://www.kb.cert.org/vuls/id/905115\nhttps://www.opennet.ru/openforum/vsluhforumID3/117645.html\nhttps://www.oracle.com/security-alerts/cpujan2020.html\nhttps://www.oracle.com/security-alerts/cpuoct2020.html\nhttps://www.suse.com/security/cve/CVE-2019-11479/\nhttps://www.synology.com/security/advisory/Synology_SA_19_28\nhttps://www.us-cert.gov/ics/advisories/icsa-19-253-03\nhttps://www.us-cert.gov/ics/advisories/icsma-20-170-06",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438/\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0410\u0421\u0423 \u0422\u041f, \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0410\u0421\u0423 \u0422\u041f, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-400, CWE-405, CWE-770",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…