var-201611-0386
Vulnerability from variot

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW.". Linux Implemented in the kernel memory subsystem copy-on-write The mechanism contains a vulnerability that causes a race condition. Race condition (CWE-362) - CVE-2016-5195 Linux The kernel memory subsystem copy-on-write Due to the implementation problem of the mechanism, A vulnerability exists that causes a race condition. Detailed information such as reproduction code Dirty COW Please refer to. Dirty COW https://dirtycow.ninja/ Attack activity using this vulnerability has been confirmed.Depending on who can log in, root You may get permission. Linux kernel is prone to a local privilege-escalation vulnerability. Local attackers may exploit this issue to gain elevated privileges. ========================================================================== Ubuntu Security Notice USN-3106-1 October 20, 2016

linux vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 16.04 LTS

Summary:

The system could be made to run programs as an administrator.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04 LTS: linux-image-4.4.0-45-generic 4.4.0-45.66 linux-image-4.4.0-45-generic-lpae 4.4.0-45.66 linux-image-4.4.0-45-lowlatency 4.4.0-45.66 linux-image-4.4.0-45-powerpc-e500mc 4.4.0-45.66 linux-image-4.4.0-45-powerpc-smp 4.4.0-45.66 linux-image-4.4.0-45-powerpc64-emb 4.4.0-45.66 linux-image-4.4.0-45-powerpc64-smp 4.4.0-45.66

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. Login to the Operations Agent system with root privileges
2. Update the system using 'yum update kernel' command 3. Reboot the server using '/sbin/shutdown -r now' command

Please contact HPE Technical Support if any assistance is needed regarding the mitigation steps. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Important: kernel security update Advisory ID: RHSA-2016:2105-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2105.html Issue date: 2016-10-25 CVE Names: CVE-2016-5195 =====================================================================

  1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

  1. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)

Red Hat would like to thank Phil Oester for reporting this issue.

  1. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

  1. Bugs fixed (https://bugzilla.redhat.com/):

1384344 - CVE-2016-5195 kernel: mm: privilege escalation via MAP_PRIVATE COW breakage

  1. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source: kernel-2.6.32-642.6.2.el6.src.rpm

i386: kernel-2.6.32-642.6.2.el6.i686.rpm kernel-debug-2.6.32-642.6.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm kernel-devel-2.6.32-642.6.2.el6.i686.rpm kernel-headers-2.6.32-642.6.2.el6.i686.rpm perf-2.6.32-642.6.2.el6.i686.rpm perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm

noarch: kernel-abi-whitelists-2.6.32-642.6.2.el6.noarch.rpm kernel-doc-2.6.32-642.6.2.el6.noarch.rpm kernel-firmware-2.6.32-642.6.2.el6.noarch.rpm

x86_64: kernel-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm kernel-devel-2.6.32-642.6.2.el6.x86_64.rpm kernel-headers-2.6.32-642.6.2.el6.x86_64.rpm perf-2.6.32-642.6.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

i386: kernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm python-perf-2.6.32-642.6.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm

x86_64: kernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm python-perf-2.6.32-642.6.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source: kernel-2.6.32-642.6.2.el6.src.rpm

noarch: kernel-abi-whitelists-2.6.32-642.6.2.el6.noarch.rpm kernel-doc-2.6.32-642.6.2.el6.noarch.rpm kernel-firmware-2.6.32-642.6.2.el6.noarch.rpm

x86_64: kernel-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm kernel-devel-2.6.32-642.6.2.el6.x86_64.rpm kernel-headers-2.6.32-642.6.2.el6.x86_64.rpm perf-2.6.32-642.6.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

x86_64: kernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm python-perf-2.6.32-642.6.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source: kernel-2.6.32-642.6.2.el6.src.rpm

i386: kernel-2.6.32-642.6.2.el6.i686.rpm kernel-debug-2.6.32-642.6.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm kernel-devel-2.6.32-642.6.2.el6.i686.rpm kernel-headers-2.6.32-642.6.2.el6.i686.rpm perf-2.6.32-642.6.2.el6.i686.rpm perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm

noarch: kernel-abi-whitelists-2.6.32-642.6.2.el6.noarch.rpm kernel-doc-2.6.32-642.6.2.el6.noarch.rpm kernel-firmware-2.6.32-642.6.2.el6.noarch.rpm

ppc64: kernel-2.6.32-642.6.2.el6.ppc64.rpm kernel-bootwrapper-2.6.32-642.6.2.el6.ppc64.rpm kernel-debug-2.6.32-642.6.2.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm kernel-debug-devel-2.6.32-642.6.2.el6.ppc64.rpm kernel-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-642.6.2.el6.ppc64.rpm kernel-devel-2.6.32-642.6.2.el6.ppc64.rpm kernel-headers-2.6.32-642.6.2.el6.ppc64.rpm perf-2.6.32-642.6.2.el6.ppc64.rpm perf-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm

s390x: kernel-2.6.32-642.6.2.el6.s390x.rpm kernel-debug-2.6.32-642.6.2.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.s390x.rpm kernel-debug-devel-2.6.32-642.6.2.el6.s390x.rpm kernel-debuginfo-2.6.32-642.6.2.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-642.6.2.el6.s390x.rpm kernel-devel-2.6.32-642.6.2.el6.s390x.rpm kernel-headers-2.6.32-642.6.2.el6.s390x.rpm kernel-kdump-2.6.32-642.6.2.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-642.6.2.el6.s390x.rpm kernel-kdump-devel-2.6.32-642.6.2.el6.s390x.rpm perf-2.6.32-642.6.2.el6.s390x.rpm perf-debuginfo-2.6.32-642.6.2.el6.s390x.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.s390x.rpm

x86_64: kernel-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm kernel-devel-2.6.32-642.6.2.el6.x86_64.rpm kernel-headers-2.6.32-642.6.2.el6.x86_64.rpm perf-2.6.32-642.6.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

i386: kernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm python-perf-2.6.32-642.6.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm

ppc64: kernel-debug-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm kernel-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-642.6.2.el6.ppc64.rpm perf-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm python-perf-2.6.32-642.6.2.el6.ppc64.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm

s390x: kernel-debug-debuginfo-2.6.32-642.6.2.el6.s390x.rpm kernel-debuginfo-2.6.32-642.6.2.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-642.6.2.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-642.6.2.el6.s390x.rpm perf-debuginfo-2.6.32-642.6.2.el6.s390x.rpm python-perf-2.6.32-642.6.2.el6.s390x.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.s390x.rpm

x86_64: kernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm python-perf-2.6.32-642.6.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source: kernel-2.6.32-642.6.2.el6.src.rpm

i386: kernel-2.6.32-642.6.2.el6.i686.rpm kernel-debug-2.6.32-642.6.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm kernel-devel-2.6.32-642.6.2.el6.i686.rpm kernel-headers-2.6.32-642.6.2.el6.i686.rpm perf-2.6.32-642.6.2.el6.i686.rpm perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm

noarch: kernel-abi-whitelists-2.6.32-642.6.2.el6.noarch.rpm kernel-doc-2.6.32-642.6.2.el6.noarch.rpm kernel-firmware-2.6.32-642.6.2.el6.noarch.rpm

x86_64: kernel-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm kernel-devel-2.6.32-642.6.2.el6.x86_64.rpm kernel-headers-2.6.32-642.6.2.el6.x86_64.rpm perf-2.6.32-642.6.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

i386: kernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm python-perf-2.6.32-642.6.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm

x86_64: kernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm python-perf-2.6.32-642.6.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2016-5195 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/2706661

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iD4DBQFYEJcBXlSAg2UNWIIRAiWLAKCCzQq/hlgGpFbZwm1VmGEtsf8qbwCYhOVp coEi7YBOAF6JIj/7g1jNNg== =enSu -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 6.5) - noarch, x86_64

  1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05341463

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05341463 Version: 1

HPSBHF03682 rev.1 - HPE Comware 7 Network Products using SSL/TLS, Local Gain Privileged Access

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2016-11-23 Last Updated: 2016-11-23

Potential Security Impact: Local: Gain Privileged Access

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY A security vulnerability in the Linux kernel could potentially impact HPE Comware 7 network products. The vulnerability could be exploited locally to gain privileged access.

References:

  • CVE-2016-5195 - Local Gain Privileged Access, aka "Dirty COW"

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  • Comware 7 (CW7) Products All Versions - Please refer to the RESOLUTION below for a list of impacted products.

BACKGROUND

CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

CVE-2016-5195
  7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided the following mitigation information from H3C to resolve the vulnerability for all Comware 7 products.

Mitigation Information:

Comware v7 products are potentially vulnerable because Comware v7 uses an affected version of the Linux kernel. However, the risk is mitigated because Comware v7 does not provide an interface that allows access to memory. Customers should always ensure that only software images provided directly from HPE are loaded on the switch.

Notes:

  • Comware v5 is not vulnerable to this issue.
  • HPE plans to resolve this vulnerability completely in future software releases for Comware V7.

COMWARE 7 Products

  • 12500 (Comware 7) - Version: See Mitigation
    • HP Network Products
    • JC072B HP 12500 Main Processing Unit
    • JC085A HP A12518 Switch Chassis
    • JC086A HP A12508 Switch Chassis
    • JC652A HP 12508 DC Switch Chassis
    • JC653A HP 12518 DC Switch Chassis
    • JC654A HP 12504 AC Switch Chassis
    • JC655A HP 12504 DC Switch Chassis
    • JF430A HP A12518 Switch Chassis
    • JF430B HP 12518 Switch Chassis
    • JF430C HP 12518 AC Switch Chassis
    • JF431A HP A12508 Switch Chassis
    • JF431B HP 12508 Switch Chassis
    • JF431C HP 12508 AC Switch Chassis
    • JG497A HP 12500 MPU w/Comware V7 OS
    • JG782A HP FF 12508E AC Switch Chassis
    • JG783A HP FF 12508E DC Switch Chassis
    • JG784A HP FF 12518E AC Switch Chassis
    • JG785A HP FF 12518E DC Switch Chassis
    • JG802A HP FF 12500E MPU
  • 10500 (Comware 7) - Version: See Mitigation
    • HP Network Products
    • JC611A HP 10508-V Switch Chassis
    • JC612A HP 10508 Switch Chassis
    • JC613A HP 10504 Switch Chassis
    • JC748A HP 10512 Switch Chassis
    • JG608A HP FlexFabric 11908-V Switch Chassis
    • JG609A HP FlexFabric 11900 Main Processing Unit
    • JG820A HP 10504 TAA Switch Chassis
    • JG821A HP 10508 TAA Switch Chassis
    • JG822A HP 10508-V TAA Switch Chassis
    • JG823A HP 10512 TAA Switch Chassis
    • JG496A HP 10500 Type A MPU w/Comware v7 OS
    • JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating System
    • JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System Main Processing Unit
  • 12900 (Comware 7) - Version: See Mitigation
    • HP Network Products
    • JG619A HP FlexFabric 12910 Switch AC Chassis
    • JG621A HP FlexFabric 12910 Main Processing Unit
    • JG632A HP FlexFabric 12916 Switch AC Chassis
    • JG634A HP FlexFabric 12916 Main Processing Unit
    • JH104A HP FlexFabric 12900E Main Processing Unit
    • JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit
    • JH263A HP FlexFabric 12904E Main Processing Unit
    • JH255A HP FlexFabric 12908E Switch Chassis
    • JH262A HP FlexFabric 12904E Switch Chassis
    • JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis
    • JH103A HP FlexFabric 12916E Switch Chassis
  • 5900 (Comware 7) - Version: See Mitigation
    • HP Network Products
    • JC772A HP 5900AF-48XG-4QSFP+ Switch
    • JG296A HP 5920AF-24XG Switch
    • JG336A HP 5900AF-48XGT-4QSFP+ Switch
    • JG510A HP 5900AF-48G-4XG-2QSFP+ Switch
    • JG554A HP 5900AF-48XG-4QSFP+ TAA Switch
    • JG555A HP 5920AF-24XG TAA Switch
    • JG838A HP FF 5900CP-48XG-4QSFP+ Switch
    • JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant
    • JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch
    • JH038A HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant
  • MSR1000 (Comware 7) - Version: See Mitigation
    • HP Network Products
    • JG875A HP MSR1002-4 AC Router
    • JH060A HP MSR1003-8S AC Router
  • MSR2000 (Comware 7) - Version: See Mitigation
    • HP Network Products
    • JG411A HP MSR2003 AC Router
    • JG734A HP MSR2004-24 AC Router
    • JG735A HP MSR2004-48 Router
    • JG866A HP MSR2003 TAA-compliant AC Router
  • MSR3000 (Comware 7) - Version: See Mitigation
    • HP Network Products
    • JG404A HP MSR3064 Router
    • JG405A HP MSR3044 Router
    • JG406A HP MSR3024 AC Router
    • JG407A HP MSR3024 DC Router
    • JG408A HP MSR3024 PoE Router
    • JG409A HP MSR3012 AC Router
    • JG410A HP MSR3012 DC Router
    • JG861A HP MSR3024 TAA-compliant AC Router
  • MSR4000 (Comware 7) - Version: See Mitigation
    • HP Network Products
    • JG402A HP MSR4080 Router Chassis
    • JG403A HP MSR4060 Router Chassis
    • JG412A HP MSR4000 MPU-100 Main Processing Unit
    • JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit
  • MSR95X - Version: See Mitigation
    • HP Network Products
    • JH296A HPE MSR954 1GbE SFP 2GbE-WAN 4GbE-LAN CWv7 Router
    • JH297A HPE MSR954-W 1GbE SFP (WW) 2GbE-WAN 4GbE-LAN Wireless 802.11n CWv7 Router
    • JH298A HPE MSR954-W 1GbE SFP LTE (AM) 2GbE-WAN 4GbE-LAN Wireless 802.11n CWv7 Router
    • JH299A HPE MSR954-W 1GbE SFP LTE (WW) 2GbE-WAN 4GbE-LAN Wireless 802.11n CWv7 Router
    • JH300A HPE FlexNetwork MSR958 1GbE and Combo 2GbE WAN 8GbE LAN Router
    • JH301A HPE FlexNetwork MSR958 1GbE and Combo 2GbE WAN 8GbE LAN PoE Router
  • VSR (Comware 7) - Version: See Mitigation
    • HP Network Products
    • JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation Software
    • JG811AAE HP VSR1001 Comware 7 Virtual Services Router
    • JG812AAE HP VSR1004 Comware 7 Virtual Services Router
    • JG813AAE HP VSR1008 Comware 7 Virtual Services Router
  • 7900 (Comware 7) - Version: See Mitigation
    • HP Network Products
    • JG682A HP FlexFabric 7904 Switch Chassis
    • JG841A HP FlexFabric 7910 Switch Chassis
    • JG842A HP FlexFabric 7910 7.2Tbps Fabric / Main Processing Unit
    • JH001A HP FlexFabric 7910 2.4Tbps Fabric / Main Processing Unit
    • JH122A HP FlexFabric 7904 TAA-compliant Switch Chassis
    • JH123A HP FlexFabric 7910 TAA-compliant Switch Chassis
    • JH124A HP FlexFabric 7910 7.2Tbps TAA-compliant Fabric/Main Processing Unit
    • JH125A HP FlexFabric 7910 2.4Tbps TAA-compliant Fabric/Main Processing Unit
  • 5130EI (Comware 7) - Version: See Mitigation
    • HP Network Products
    • JG932A HP 5130-24G-4SFP+ EI Switch
    • JG933A HP 5130-24G-SFP-4SFP+ EI Switch
    • JG934A HP 5130-48G-4SFP+ EI Switch
    • JG936A HP 5130-24G-PoE+-4SFP+ (370W) EI Switch
    • JG937A HP 5130-48G-PoE+-4SFP+ (370W) EI Switch
    • JG938A HP 5130-24G-2SFP+-2XGT EI Switch
    • JG939A HP 5130-48G-2SFP+-2XGT EI Switch
    • JG940A HP 5130-24G-PoE+-2SFP+-2XGT (370W) EI Switch
    • JG941A HP 5130-48G-PoE+-2SFP+-2XGT (370W) EI Switch
    • JG975A HP 5130-24G-4SFP+ EI Brazil Switch
    • JG976A HP 5130-48G-4SFP+ EI Brazil Switch
    • JG977A HP 5130-24G-PoE+-4SFP+ (370W) EI Brazil Switch
    • JG978A HP 5130-48G-PoE+-4SFP+ (370W) EI Brazil Switch
  • 6125XLG - Version: See Mitigation
    • HP Network Products
    • 711307-B21 HP 6125XLG Blade Switch
    • 737230-B21 HP 6125XLG Blade Switch with TAA
  • 6127XLG - Version: See Mitigation
    • HP Network Products
    • 787635-B21 HP 6127XLG Blade Switch Opt Kit
    • 787635-B22 HP 6127XLG Blade Switch Opt Kit TAA
  • Moonshot - Version: See Mitigation
    • HP Network Products
    • 786617-B21 - HP Moonshot-45Gc Switch Module
    • 704654-B21 - HP Moonshot-45XGc Switch Module
    • 786619-B21 - HP Moonshot-180XGc Switch Module
  • 5700 (Comware 7) - Version: See Mitigation
    • HP Network Products
    • JG894A HP FlexFabric 5700-48G-4XG-2QSFP+ Switch
    • JG895A HP FlexFabric 5700-48G-4XG-2QSFP+ TAA-compliant Switch
    • JG896A HP FlexFabric 5700-40XG-2QSFP+ Switch
    • JG897A HP FlexFabric 5700-40XG-2QSFP+ TAA-compliant Switch
    • JG898A HP FlexFabric 5700-32XGT-8XG-2QSFP+ Switch
    • JG899A HP FlexFabric 5700-32XGT-8XG-2QSFP+ TAA-compliant Switch
  • 5930 (Comware 7) - Version: See Mitigation
    • HP Network Products
    • JG726A HP FlexFabric 5930 32QSFP+ Switch
    • JG727A HP FlexFabric 5930 32QSFP+ TAA-compliant Switch
    • JH178A HP FlexFabric 5930 2QSFP+ 2-slot Switch
    • JH179A HP FlexFabric 5930 4-slot Switch
    • JH187A HP FlexFabric 5930 2QSFP+ 2-slot TAA-compliant Switch
    • JH188A HP FlexFabric 5930 4-slot TAA-compliant Switch
  • HSR6600 (Comware 7) - Version: See Mitigation
    • HP Network Products
    • JG353A HP HSR6602-G Router
    • JG354A HP HSR6602-XG Router
    • JG776A HP HSR6602-G TAA-compliant Router
    • JG777A HP HSR6602-XG TAA-compliant Router
  • HSR6800 (Comware 7) - Version: See Mitigation
    • HP Network Products
    • JG361A HP HSR6802 Router Chassis
    • JG361B HP HSR6802 Router Chassis
    • JG362A HP HSR6804 Router Chassis
    • JG362B HP HSR6804 Router Chassis
    • JG363A HP HSR6808 Router Chassis
    • JG363B HP HSR6808 Router Chassis
    • JG364A HP HSR6800 RSE-X2 Router Main Processing Unit
    • JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing
    • JH075A HP HSR6800 RSE-X3 Router Main Processing Unit
  • 1950 (Comware 7) - Version: See Mitigation
    • HP Network Products
    • JG960A HP 1950-24G-4XG Switch
    • JG961A HP 1950-48G-2SFP+-2XGT Switch
    • JG962A HP 1950-24G-2SFP+-2XGT-PoE+(370W) Switch
    • JG963A HP 1950-48G-2SFP+-2XGT-PoE+(370W) Switch
  • 7500 (Comware 7) - Version: See Mitigation
    • HP Network Products
    • JD238C HP 7510 Switch Chassis
    • JD239C HP 7506 Switch Chassis
    • JD240C HP 7503 Switch Chassis
    • JD242C HP 7502 Switch Chassis
    • JH207A HP 7500 1.2Tbps Fabric with 2-port 40GbE QSFP+ for IRF-Only Main Processing Unit
    • JH208A HP 7502 Main Processing Unit
    • JH209A HP 7500 2.4Tbps Fabric with 8-port 1/10GbE SFP+ and 2-port 40GbE QSFP+ Main Processing Unit
  • 5130HI - Version: See Mitigation
    • HP Network Products
    • JH323A HPE 5130 24G 4SFP+ 1-slot HI Switch
    • JH324A HPE 5130 48G 4SFP+ 1-slot HI Switch
    • JH325A HPE 5130 24G PoE+ 4SFP+ 1-slot HI Switch
    • JH326A HPE 5130 48G PoE+ 4SFP+ 1-slot HI Switch
  • 5510HI - Version: See Mitigation
    • HP Network Products
    • JH145A HPE 5510 24G 4SFP+ HI 1-slot Switch
    • JH146A HPE 5510 48G 4SFP+ HI 1-slot Switch
    • JH147A HPE 5510 24G PoE+ 4SFP+ HI 1-slot Switch
    • JH148A HPE 5510 48G PoE+ 4SFP+ HI 1-slot Switch
    • JH149A HPE 5510 24G SFP 4SFP+ HI 1-slot Switch
  • 5950 (Comware 7) - Version: See Mitigation
    • HP Network Products
    • JH321A HPE FlexFabric 5950 32QSFP28 Switch
  • 5940 (Comware 7) - Version: See Mitigation
    • HP Network Products
    • JH390A HPE FlexFabric 5940 48SFP+ 6QSFP28 Switch
    • JH391A HPE FlexFabric 5940 48XGT 6QSFP28 Switch
    • JH394A HPE FlexFabric 5940 48XGT 6QSFP+ Switch
    • JH395A HPE FlexFabric 5940 48SFP+ 6QSFP+ Switch
    • JH396A HPE FlexFabric 5940 32QSFP+ Switch
    • JH397A HPE FlexFabric 5940 2-slot Switch
    • JH398A HPE FlexFabric 5940 4-slot Switch
  • 12900E - Version: See Mitigation
    • HP Network Products
    • JG619A HP FlexFabric 12910 Switch AC Chassis
    • JG621A HP FlexFabric 12910 Main Processing Unit
    • JG632A HP FlexFabric 12916 Switch AC Chassis
    • JG634A HP FlexFabric 12916 Main Processing Unit
    • JH104A HP FlexFabric 12900E Main Processing Unit
    • JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit
    • JH263A HP FlexFabric 12904E Main Processing Unit
    • JH255A HP FlexFabric 12908E Switch Chassis
    • JH262A HP FlexFabric 12904E Switch Chassis
    • JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis
    • JH103A HP FlexFabric 12916E Switch Chassis

HISTORY Version:1 (rev.1) - 23 November 2016 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com.

Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201611-0386",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "linux",
            scope: "eq",
            trust: 1.6,
            vendor: "debian",
            version: "8.0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 1.3,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "16.10",
         },
         {
            model: "kernel",
            scope: "lt",
            trust: 1,
            vendor: "linux",
            version: "4.1.35",
         },
         {
            model: "kernel",
            scope: "lt",
            trust: 1,
            vendor: "linux",
            version: "3.18.44",
         },
         {
            model: "kernel",
            scope: "gte",
            trust: 1,
            vendor: "linux",
            version: "3.19",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.0",
         },
         {
            model: "oncommand performance manager",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "kernel",
            scope: "lt",
            trust: 1,
            vendor: "linux",
            version: "3.16.38",
         },
         {
            model: "kernel",
            scope: "gte",
            trust: 1,
            vendor: "linux",
            version: "4.5",
         },
         {
            model: "oncommand unified manager for clustered data ontap",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "kernel",
            scope: "lt",
            trust: 1,
            vendor: "linux",
            version: "4.8.3",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.0",
         },
         {
            model: "enterprise linux aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.4",
         },
         {
            model: "kernel",
            scope: "lt",
            trust: 1,
            vendor: "linux",
            version: "3.2.83",
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "14.04",
         },
         {
            model: "enterprise linux long life",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "5.9",
         },
         {
            model: "kernel",
            scope: "lt",
            trust: 1,
            vendor: "linux",
            version: "4.4.26",
         },
         {
            model: "kernel",
            scope: "gte",
            trust: 1,
            vendor: "linux",
            version: "3.3",
         },
         {
            model: "kernel",
            scope: "gte",
            trust: 1,
            vendor: "linux",
            version: "2.6.22",
         },
         {
            model: "kernel",
            scope: "lt",
            trust: 1,
            vendor: "linux",
            version: "4.7.9",
         },
         {
            model: "cloud backup",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "solidfire",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "kernel",
            scope: "lt",
            trust: 1,
            vendor: "linux",
            version: "3.10.104",
         },
         {
            model: "snapprotect",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "oncommand balance",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "pan-os",
            scope: "lt",
            trust: 1,
            vendor: "paloaltonetworks",
            version: "7.1.8",
         },
         {
            model: "enterprise linux tus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.5",
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "24",
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "25",
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "12.04",
         },
         {
            model: "kernel",
            scope: "lt",
            trust: 1,
            vendor: "linux",
            version: "3.12.66",
         },
         {
            model: "kernel",
            scope: "gte",
            trust: 1,
            vendor: "linux",
            version: "4.8",
         },
         {
            model: "enterprise linux eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.6",
         },
         {
            model: "enterprise linux eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.7",
         },
         {
            model: "kernel",
            scope: "gte",
            trust: 1,
            vendor: "linux",
            version: "4.2",
         },
         {
            model: "enterprise linux long life",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "5.6",
         },
         {
            model: "pan-os",
            scope: "gte",
            trust: 1,
            vendor: "paloaltonetworks",
            version: "7.1.0",
         },
         {
            model: "kernel",
            scope: "gte",
            trust: 1,
            vendor: "linux",
            version: "3.11",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1,
            vendor: "debian",
            version: "7.0",
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "16.04",
         },
         {
            model: "enterprise linux aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.2",
         },
         {
            model: "ontap select deploy administration utility",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "enterprise linux eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.1",
         },
         {
            model: "kernel",
            scope: "gte",
            trust: 1,
            vendor: "linux",
            version: "3.13",
         },
         {
            model: "hci storage nodes",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "23",
         },
         {
            model: "pan-os",
            scope: "gte",
            trust: 1,
            vendor: "paloaltonetworks",
            version: "5.1",
         },
         {
            model: "pan-os",
            scope: "lt",
            trust: 1,
            vendor: "paloaltonetworks",
            version: "7.0.14",
         },
         {
            model: "kernel",
            scope: "gte",
            trust: 1,
            vendor: "linux",
            version: "3.5",
         },
         {
            model: "kernel",
            scope: "lt",
            trust: 1,
            vendor: "linux",
            version: "3.4.113",
         },
         {
            model: "enterprise linux aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.5",
         },
         {
            model: "kernel",
            scope: "gte",
            trust: 1,
            vendor: "linux",
            version: "3.17",
         },
         {
            model: "ubuntu",
            scope: null,
            trust: 0.8,
            vendor: "canonical",
            version: null,
         },
         {
            model: "ubuntu core",
            scope: null,
            trust: 0.8,
            vendor: "canonical",
            version: null,
         },
         {
            model: "gnu/linux",
            scope: null,
            trust: 0.8,
            vendor: "debian",
            version: null,
         },
         {
            model: "kernel",
            scope: "lt",
            trust: 0.8,
            vendor: "linux",
            version: "4.4.26 earlier",
         },
         {
            model: "kernel",
            scope: "lt",
            trust: 0.8,
            vendor: "linux",
            version: "4.7.9 earlier",
         },
         {
            model: "kernel",
            scope: "lt",
            trust: 0.8,
            vendor: "linux",
            version: "4.8.3 earlier",
         },
         {
            model: "enterprise linux",
            scope: null,
            trust: 0.8,
            vendor: "red hat",
            version: null,
         },
         {
            model: "enterprise linux long life",
            scope: null,
            trust: 0.8,
            vendor: "red hat",
            version: null,
         },
         {
            model: "enterprise linux server aus",
            scope: null,
            trust: 0.8,
            vendor: "red hat",
            version: null,
         },
         {
            model: "enterprise linux server eus",
            scope: null,
            trust: 0.8,
            vendor: "red hat",
            version: null,
         },
         {
            model: "enterprise linux server tus",
            scope: null,
            trust: 0.8,
            vendor: "red hat",
            version: null,
         },
         {
            model: "csview",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "/web questionnaire v5.1/5.2/5.4 (red hat enterprise linux server 5)",
         },
         {
            model: "csview",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "/web questionnaire v5.5 (red hat enterprise linux server 7/ centos 7)",
         },
         {
            model: "refam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "/e",
         },
         {
            model: "refam",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "vx",
         },
         {
            model: "universalbackup",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "server",
         },
         {
            model: "paging server",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.62",
         },
         {
            model: "msr95x",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "0.9.110.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.24.6",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.114",
         },
         {
            model: "security guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.1",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.1.11",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.1.15",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.117",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.31.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "32.0.1700.95",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.22",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.0.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.112",
         },
         {
            model: "cloudengine v200r001sph002",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: "8800",
         },
         {
            model: "(comware r2122",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "79007)",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.46",
         },
         {
            model: "identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.52",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.28.4",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.89",
         },
         {
            model: "video surveillance media server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.12",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.36",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.34.13",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.10",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.16",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.80",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.155",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.15",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.39",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.38.3",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.14",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.11.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7.4",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.5.1.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.26.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.16",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.5.1.131",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.36",
         },
         {
            model: "nexus",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "6",
         },
         {
            model: "(comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "59507)0",
         },
         {
            model: "powerkvm",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.25",
         },
         {
            model: "ip interoperability and collaboration system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "cloudengine v100r005c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "7800",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.80",
         },
         {
            model: "5130ei (comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7)0",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.1.13",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.12",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.0.10",
         },
         {
            model: "edge digital media player",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3400",
         },
         {
            model: "enterprise linux client optional",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "cloudengine v100r003c10",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "12800",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.4",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.18.2",
         },
         {
            model: "cloudengine v100r002c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "12800",
         },
         {
            model: "linux cloudlinuxos",
            scope: "eq",
            trust: 0.3,
            vendor: "cloud",
            version: "7",
         },
         {
            model: "12900e",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "kernel 3.19-rc7",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.7",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.34.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.13",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.31.6",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.27",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.170",
         },
         {
            model: "pan-os",
            scope: "ne",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.0.14",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.38.2",
         },
         {
            model: "6127xlg",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "jabber guest",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.65",
         },
         {
            model: "vds recorder",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vrealize operations",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "6.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.25.4",
         },
         {
            model: "cloudengine v200r001c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "12800",
         },
         {
            model: "visual quality experience server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "junos space 15.1f2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.24.4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.32",
         },
         {
            model: "pan-os",
            scope: "ne",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.1.8",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.2",
         },
         {
            model: "kernel 4.4-rc1",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "vrealize automation",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "6.0",
         },
         {
            model: "containers for linux",
            scope: "eq",
            trust: 0.3,
            vendor: "virtuozzo",
            version: "4.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.24.3",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "16.10",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.45",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.42",
         },
         {
            model: "ar3200 v200r006c15",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.31",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "coreos",
            version: "1164.1",
         },
         {
            model: "helion cloudsystem",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.5",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.121",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.88",
         },
         {
            model: "kernel 4.1-rc6",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.48",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.3",
         },
         {
            model: "cloudengine v100r006c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "8800",
         },
         {
            model: "vrealize operations",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "6.3.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.31",
         },
         {
            model: "(comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "59307)0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.120",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.63-2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7.9",
         },
         {
            model: "linux enterprise server sp2 ltss",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.22",
         },
         {
            model: "msr3000 (comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7)0",
         },
         {
            model: "msr2000 (comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7)0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.10",
         },
         {
            model: "enterprise linux hpc node eus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7.3",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.38",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.35.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.34",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.1.15",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.49",
         },
         {
            model: "enterprise linux client",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.13.11",
         },
         {
            model: "junos space 15.1r2.11",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "8.0.552.342",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.53",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.38.6",
         },
         {
            model: "scos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.18.3",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.48",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.57",
         },
         {
            model: "kernel 4.1-rc1",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.48",
         },
         {
            model: "linux",
            scope: "ne",
            trust: 0.3,
            vendor: "coreos",
            version: "1192.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.37",
         },
         {
            model: "kernel 3.14-rc4",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "coreos",
            version: "1164.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.8.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.4",
         },
         {
            model: "security guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9.5",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.16",
         },
         {
            model: "enterprise linux hpc node eus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.2.3",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.49",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.11",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.0.6",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.13",
         },
         {
            model: "email gateway 7.6.2h968406",
            scope: null,
            trust: 0.3,
            vendor: "mcafee",
            version: null,
         },
         {
            model: "vrealize automation",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "6.2",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.1.4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.66",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.8",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.49",
         },
         {
            model: "common services platform collector",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "vds-tv streamer",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.31",
         },
         {
            model: "5510hi",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "6125xlg",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.13.7",
         },
         {
            model: "pixel xl",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.124",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.17",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.9.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.0.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.169",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.34",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.47",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.14",
         },
         {
            model: "linux cloudlinuxos",
            scope: "eq",
            trust: 0.3,
            vendor: "cloud",
            version: "6.0",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.405",
         },
         {
            model: "nexus",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "9",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.26",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.18.22",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.25.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.54",
         },
         {
            model: "cloudengine v100r005c10",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "6800",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.2",
         },
         {
            model: "ar3200 v200r008c20spc700",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "linux enterprise server 11-extra",
            scope: null,
            trust: 0.3,
            vendor: "suse",
            version: null,
         },
         {
            model: "security guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.11",
         },
         {
            model: "kernel 3.19-rc",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "linux enterprise module for public cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "12",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.18",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.27.54",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.18.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.21",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.22",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.87",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.16.6",
         },
         {
            model: "security guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10",
         },
         {
            model: "vrealize automation",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "7.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.46",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.17",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.12",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.81",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.90",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.99",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.168",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.11.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.2",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.0.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.53",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.33",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.9",
         },
         {
            model: "(comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "75007)0",
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.3",
         },
         {
            model: "propel",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.20",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.41",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.5.0.997",
         },
         {
            model: "prime network change and configuration management",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.71",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.16",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "0.9.128.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.67",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.1.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.40",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.30",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.26",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.65",
         },
         {
            model: "ucs director",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.0.5",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.70",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.17",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.1.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.37",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.0.12",
         },
         {
            model: "junos space 15.2r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "(comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "105007)0",
         },
         {
            model: "kernel 4.4-rc4",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.15",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.22",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.13.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14-4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.81",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.27.26",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.23",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.110",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.28",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.3.5",
         },
         {
            model: "kernel 3.9-rc3",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.108",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.17.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.95",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.8",
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6.2",
         },
         {
            model: "powerkvm",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.19",
         },
         {
            model: "(comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "129007)0",
         },
         {
            model: "unified communications manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.0.1",
         },
         {
            model: "kernel 3.13-rc1",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.45",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.29",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.62",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.5",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.116",
         },
         {
            model: "msr1000 (comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7)0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.7",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.17",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "coreos",
            version: "1192.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.67",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.17",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.62",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.115",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.2",
         },
         {
            model: "videoscape distribution suite service manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.2.8",
         },
         {
            model: "helion cloudsystem",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.1.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.14",
         },
         {
            model: "dx series ip phones",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.5.4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.56",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.33",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.76",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.12",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.39",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.1",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "kernel 3.9-rc8",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.25.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.2",
         },
         {
            model: "(comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "79007)0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.78",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.28",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "35.0.1916.155",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.38",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.1.2",
         },
         {
            model: "vrealize operations 6.2.0a",
            scope: null,
            trust: 0.3,
            vendor: "vmware",
            version: null,
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.24",
         },
         {
            model: "cloudengine v100r006c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "6800",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.57",
         },
         {
            model: "kernel",
            scope: "ne",
            trust: 0.3,
            vendor: "linux",
            version: "4.7.9",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.88",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.44",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.27",
         },
         {
            model: "linux enterprise desktop sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "12",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.82",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.15",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.0.70",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.404",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.1.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.51",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.9",
         },
         {
            model: "cloudengine v100r005c10",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "12800",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "8.0.552.344",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.13",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.55",
         },
         {
            model: "spa122 analog telephone adapter with router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "kernel 3.8-rc1",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "virtuozzo",
            scope: "eq",
            trust: 0.3,
            vendor: "virtuozzo",
            version: "6.0",
         },
         {
            model: "connected grid routers",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "security guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.0.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.5.2",
         },
         {
            model: "cloudengine v100r003c10",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "7800",
         },
         {
            model: "linux enterprise point of sale 11-sp3",
            scope: null,
            trust: 0.3,
            vendor: "suse",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.72",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.18.8",
         },
         {
            model: "linux enterprise server 12-ltss",
            scope: null,
            trust: 0.3,
            vendor: "suse",
            version: null,
         },
         {
            model: "android",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.17",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.21",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.401",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.81",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.14",
         },
         {
            model: "linux enterprise software development kit sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "12",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "37.0.2062.119",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.54",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.123",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.50",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.37",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.3.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.3.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.25.2",
         },
         {
            model: "android one",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "0",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.0.4",
         },
         {
            model: "email gateway 7.6.405h1165239",
            scope: null,
            trust: 0.3,
            vendor: "mcafee",
            version: null,
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.15.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.10",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.16.36",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.59",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.5.3",
         },
         {
            model: "cloudengine v200r001c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "7800",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.12",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.50",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.8.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.11",
         },
         {
            model: "kernel 3.19-rc2",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "series digital media players",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "44000",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "7",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.113",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.60",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.35",
         },
         {
            model: "ata series analog terminal adaptors",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1900",
         },
         {
            model: "linux enterprise server sp3 ltss",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.40",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "linux enterprise server for sap",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "12",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.34.14",
         },
         {
            model: "cloudengine v200r001c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "8800",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.48",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.18",
         },
         {
            model: "(comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "59007)0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.41",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.72",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.0.12",
         },
         {
            model: "unified communications manager session management edition",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "enterprise linux mrg",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "2",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.32",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.6",
         },
         {
            model: "security guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.75",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.24",
         },
         {
            model: "linux cloudlinuxos",
            scope: "eq",
            trust: 0.3,
            vendor: "cloud",
            version: "5.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.66",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.5(.1.131)",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.23",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.32",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.38",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "13.3",
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "coreos",
            version: "1153.4",
         },
         {
            model: "prime access registrar",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.3.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.13.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.62",
         },
         {
            model: "linux",
            scope: "ne",
            trust: 0.3,
            vendor: "coreos",
            version: "1122.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.64",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.63",
         },
         {
            model: "moonshot",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "48.0.2564.116",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.1.11",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.37",
         },
         {
            model: "junos space 15.2r2",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.53",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.7",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.0",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.1.1",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "16.04",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.93",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.7",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.1",
         },
         {
            model: "onepk all-in-one virtual machine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "linux enterprise debuginfo sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.61",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.5.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.41",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "28.0.1500.71",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.1",
         },
         {
            model: "linux enterprise workstation extension sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "12",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.6",
         },
         {
            model: "nexus",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "5x",
         },
         {
            model: "kernel 3.9-rc7",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.27.51",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.11.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.57",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.27.49",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.15.5",
         },
         {
            model: "fusioncube v100r002c60spc100",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "28.0.1500.95",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.21",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.6.1.30",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14.7",
         },
         {
            model: "vds-tv vault",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "cloudengine v100r006c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "12800",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.31",
         },
         {
            model: "kernel 3.11-rc7",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.40",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.35.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7.8",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "coreos",
            version: "1153.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.9",
         },
         {
            model: "hsr6600 (comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7)0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1183.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.13",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.0.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.23.14",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.39",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.18",
         },
         {
            model: "spa232d multi-line dect analog telephone adapter",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.11",
         },
         {
            model: "chrome os",
            scope: "ne",
            trust: 0.3,
            vendor: "google",
            version: "54.0.2840.79",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.37",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.5",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.171",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.73",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.57",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.79",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.19",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.18",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.1.13",
         },
         {
            model: "helion cloudsystem",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.0.1",
         },
         {
            model: "security guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "10.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.34.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.73",
         },
         {
            model: "dcm series d990x digital content manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14-1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.156",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.1",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.1.10",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.56",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.3",
         },
         {
            model: "leap",
            scope: "eq",
            trust: 0.3,
            vendor: "opensuse",
            version: "42.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.30.3",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.64",
         },
         {
            model: "(comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "57007)0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.58",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "coreos",
            version: "1192.2",
         },
         {
            model: "enterprise linux server eus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.33",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.54",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7.10",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.23",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.56",
         },
         {
            model: "junos space 14.1r1.9",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.0.13",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.14",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.154",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.17",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.25",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.6",
         },
         {
            model: "linux enterprise server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "12",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.5",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.172",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.30",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.13",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.9",
         },
         {
            model: "cloudengine v100r003c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "6800",
         },
         {
            model: "cloudengine v200r001sph002",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: "6800",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.0.14",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.15",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.43",
         },
         {
            model: "vrealize operations",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "6.1.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.35.13",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "33.0.1750.152",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.1.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.18",
         },
         {
            model: "kernel 3.11-rc1",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.7",
         },
         {
            model: "helion cloudsystem",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "8.1.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.61",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.43",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.1",
         },
         {
            model: "enterprise linux server eus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7.2",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.0.8",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.403",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.26",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.13.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.44",
         },
         {
            model: "kernel 4.4-rc5",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.10",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.6",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.0",
         },
         {
            model: "vsr (comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7)0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.18.17",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.35",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.152",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.73",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.55",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.27",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.65",
         },
         {
            model: "ar3200 v200r006c13",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "kernel 3.0-rc1",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.1",
         },
         {
            model: "(comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "59207)0",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.1.7",
         },
         {
            model: "smart net total care onprem",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "-0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.54",
         },
         {
            model: "update hotfix",
            scope: "ne",
            trust: 0.3,
            vendor: "virtuozzo",
            version: "6.011",
         },
         {
            model: "cloudengine v100r005c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "6800",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.5.7",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.1.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.18",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.22",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.11",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.5",
         },
         {
            model: "powerkvm update",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "2.1.1.3-6513",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "spa112 2-port phone adapter",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "junos space 16.1r1",
            scope: "ne",
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.161",
         },
         {
            model: "vrealize operations",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "6.0.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.9.8",
         },
         {
            model: "fusioncube v100r002c60rc1",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.42",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.1.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.30",
         },
         {
            model: "ar3200 v200r006c12",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.38.4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.32",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.23",
         },
         {
            model: "telepresence video communication server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.43",
         },
         {
            model: "hsr6800 (comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7)0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "23.0.1271.94",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "6",
         },
         {
            model: "powerkvm update",
            scope: "ne",
            trust: 0.3,
            vendor: "ibm",
            version: "3.1.0.23",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.3.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.3",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "7",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "coreos",
            version: "1185.0",
         },
         {
            model: "manager proxy",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "2.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.18.9",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.5.1.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.41",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.91",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.04",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.26",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.46",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.0.13",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.4",
         },
         {
            model: "kernel 3.7-rc1",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "cloudengine v100r005c10",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "7800",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.31",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.18",
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.19",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.1.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.39",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.17.4",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "0.10.140.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14.5",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.58",
         },
         {
            model: "propel",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.01",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.28",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.8",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "0.9.134.14",
         },
         {
            model: "ata analog telephone adaptor",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1870",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.29",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.10",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.1.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.76",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "13.1",
         },
         {
            model: "expressway series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.21",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.1.12",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.1",
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "12.1",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.3.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.15",
         },
         {
            model: "security guardium",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "8.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.79",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.15",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.12",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.74",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6.5",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "0.9.131.0",
         },
         {
            model: "edge digital media player",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3000",
         },
         {
            model: "vrealize automation",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "6.2.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.7",
         },
         {
            model: "vrealize automation",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "6.2.4.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.63",
         },
         {
            model: "ar3200 v200r007c00",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.16.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.6",
         },
         {
            model: "cloudengine v100r003c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "12800",
         },
         {
            model: "cloudengine v200r001sph002",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: "12800",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.4.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.27",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.13",
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "vds-tv caching nodes",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.5",
         },
         {
            model: "helion openstack",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "4.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.19",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.20",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.55",
         },
         {
            model: "openstack cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.72",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.12",
         },
         {
            model: "helion openstack",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "4.0.1",
         },
         {
            model: "ar3200 v200r006c10",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "series digital media players",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "43000",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.16",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.82",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.18.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.16.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.38",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.55",
         },
         {
            model: "linux enterprise server sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.37.2",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.1.5",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.90",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.25",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.52",
         },
         {
            model: "kernel",
            scope: "ne",
            trust: 0.3,
            vendor: "linux",
            version: "4.8.3",
         },
         {
            model: "linux",
            scope: "ne",
            trust: 0.3,
            vendor: "coreos",
            version: "1185.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.16",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.1.8",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.5(.1.6)",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.0",
         },
         {
            model: "kernel 3.14-rc7",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.18.11",
         },
         {
            model: "kernel 4.3-rc1",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.14",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.23.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "0.9.126.0",
         },
         {
            model: "kernel 4.1-rc3",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.1.3",
         },
         {
            model: "cloudengine v100r005c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "12800",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.10",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.25",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.13.5",
         },
         {
            model: "propel",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.01",
         },
         {
            model: "vrealize automation",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "6.1",
         },
         {
            model: "server bare metal",
            scope: "eq",
            trust: 0.3,
            vendor: "virtuozzo",
            version: "5.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.159",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14.4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.68",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.20",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.34",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.24",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.30",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.93",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.38",
         },
         {
            model: "prime collaboration provisioning",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.50",
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "5",
         },
         {
            model: "nexus series fabric switches aci mode",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9000-0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.8",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.84",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.51",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.86",
         },
         {
            model: "cloudengine v100r006c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "7800",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.173",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.29",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.34",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.7",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "coreos",
            version: "1185.1",
         },
         {
            model: "manager",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "2.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.21",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.34",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.13.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.45",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.44",
         },
         {
            model: "helion openstack",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "3.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.16.7",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.1.16",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14.37",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "3.1.10",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14.54",
         },
         {
            model: "5130hi",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "0",
         },
         {
            model: "linux enterprise debuginfo sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "propel",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "2.10",
         },
         {
            model: "helion cloudsystem",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "10.0.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7.2",
         },
         {
            model: "nexus player",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "0",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.20",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.126",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.60",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.16",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.27",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.15",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.78",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.49",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.8.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.13.9",
         },
         {
            model: "pixel c",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.26",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.21",
         },
         {
            model: "cloud object storage",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.19.3",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.1.4",
         },
         {
            model: "junos space 14.1r1",
            scope: null,
            trust: 0.3,
            vendor: "juniper",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.20",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.5.6",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.2",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.7",
         },
         {
            model: "kernel 4.1-rc7",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.18",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.118",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.75",
         },
         {
            model: "linux enterprise live patching",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "12",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.58",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.15",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.44",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.0.15",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.70",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.52",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7.5",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.31",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.50",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.72",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.1.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.8.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.87",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.35",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.81",
         },
         {
            model: "pan-os",
            scope: "ne",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.1.17",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.92",
         },
         {
            model: "application policy infrastructure controller",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.37",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.10",
         },
         {
            model: "(comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "19507)0",
         },
         {
            model: "(comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "125007)0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.36",
         },
         {
            model: "helion cloudsystem",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.0.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.86",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.47",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.60",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.85",
         },
         {
            model: "ar3200 v200r006c16",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "centos",
            scope: "eq",
            trust: 0.3,
            vendor: "centos",
            version: "6",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.0",
         },
         {
            model: "kernel 3.11-rc4",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "40.0.2214.114",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.24",
         },
         {
            model: "helion openstack",
            scope: "ne",
            trust: 0.3,
            vendor: "hp",
            version: "3.0.3",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "53.0.2785.103",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.42",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.51",
         },
         {
            model: "vrealize automation",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "7.1",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.56",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.23.10",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.3",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "8.0.552.343",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.1.14",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.17",
         },
         {
            model: "kernel",
            scope: "ne",
            trust: 0.3,
            vendor: "linux",
            version: "4.4.26",
         },
         {
            model: "webex meetings server 2.5mr2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "cloudengine v100r003c10",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "6800",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.42",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.7",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.0.7",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "52.0.2743.85",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.125",
         },
         {
            model: "cloudengine v100r002c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "6800",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.11",
         },
         {
            model: "vrealize operations",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "6.2.1",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.400",
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "1.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.20",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.19",
         },
         {
            model: "kernel 3.17-rc3",
            scope: null,
            trust: 0.3,
            vendor: "linux",
            version: null,
         },
         {
            model: "(comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "59407)0",
         },
         {
            model: "prime service catalog virtual appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "propel",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "1.11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.22",
         },
         {
            model: "pixel",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "48.0.2564.92",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.14",
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.52",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "7.0.11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.14",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.35.4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.18",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "coreos",
            version: "1180.0",
         },
         {
            model: "prime data center network manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "cloudengine v200r001c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "6800",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364160",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.51",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.28",
         },
         {
            model: "mxe series media experience engines",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "35000",
         },
         {
            model: "nexus 6p",
            scope: null,
            trust: 0.3,
            vendor: "google",
            version: null,
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.1.3",
         },
         {
            model: "videoscape distribution suite video recording",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.31.4",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "53.0.2785.144",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.69",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14.45",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.1.12",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.36",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.8.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.8.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.8",
         },
         {
            model: "email gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.406-3402.103",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.23",
         },
         {
            model: "webex meetings server mr1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.5",
         },
         {
            model: "msr4000 (comware",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "7)0",
         },
         {
            model: "webex meetings server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.5.99.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.29",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.122",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.35",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "5.1.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.36",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.47",
         },
         {
            model: "helion cloudsystem",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "9.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.6",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "6.0",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.77",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.98",
         },
         {
            model: "visual quality experience tools server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.1.00",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.119",
         },
         {
            model: "junos space",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "11.2",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "20.0.1132.17",
         },
         {
            model: "email gateway 7.6.405h1157986",
            scope: null,
            trust: 0.3,
            vendor: "mcafee",
            version: null,
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.30.5",
         },
         {
            model: "enterprise linux hpc node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "linux enterprise software development kit sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.17.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.13.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.30.4",
         },
         {
            model: "linux enterprise debuginfo sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "ar3200 v200r008c20",
            scope: null,
            trust: 0.3,
            vendor: "huawei",
            version: null,
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.5.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.10",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.34.3",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.98",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.3",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "25.0.1364.1",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6.402",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "21.0.1180.13",
         },
         {
            model: "chrome os",
            scope: "eq",
            trust: 0.3,
            vendor: "google",
            version: "26.0.1410.36",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.0.9",
         },
         {
            model: "pan-os",
            scope: "eq",
            trust: 0.3,
            vendor: "paloaltonetworks",
            version: "6.1.10",
         },
         {
            model: "cloudengine v100r003c00",
            scope: "eq",
            trust: 0.3,
            vendor: "huawei",
            version: "7800",
         },
         {
            model: "(comware r3108p03",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "51307)",
         },
         {
            model: "cloudengine v200r001sph002",
            scope: "ne",
            trust: 0.3,
            vendor: "huawei",
            version: "7800",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "93793",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005596",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201610-665",
         },
         {
            db: "NVD",
            id: "CVE-2016-5195",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/o:canonical:ubuntu",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:canonical:ubuntu_core",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:debian:debian_linux",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:linux:linux_kernel",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:redhat:enterprise_linux",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:redhat:enterprise_linux_long_life",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:redhat:enterprise_linux_server_aus",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:redhat:enterprise_linux_server_eus",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:redhat:enterprise_linux_server_tus",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:csview",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/h:nec:nec_cyber_security_platform",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:refam",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:nec:universalbackup",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-005596",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Phil Oester.",
      sources: [
         {
            db: "BID",
            id: "93793",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201610-665",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2016-5195",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  id: "CVE-2016-5195",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 1.9,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  author: "nvd@nist.gov",
                  availabilityImpact: "HIGH",
                  baseScore: 7,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1,
                  id: "CVE-2016-5195",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2016-5195",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "Low",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2016-5195",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "CVE-2016-5195",
                  trust: 0.8,
                  value: "High",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201610-665",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2016-5195",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2016-5195",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005596",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201610-665",
         },
         {
            db: "NVD",
            id: "CVE-2016-5195",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\". Linux Implemented in the kernel memory subsystem copy-on-write The mechanism contains a vulnerability that causes a race condition. Race condition (CWE-362) - CVE-2016-5195 Linux The kernel memory subsystem copy-on-write Due to the implementation problem of the mechanism, A vulnerability exists that causes a race condition. Detailed information such as reproduction code Dirty COW Please refer to. Dirty COW https://dirtycow.ninja/ Attack activity using this vulnerability has been confirmed.Depending on who can log in, root You may get permission. Linux kernel is prone to a local privilege-escalation vulnerability. \nLocal attackers may exploit this issue to gain elevated privileges. \n==========================================================================\nUbuntu Security Notice USN-3106-1\nOctober 20, 2016\n\nlinux vulnerability\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 16.04 LTS\n\nSummary:\n\nThe system could be made to run programs as an administrator. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 16.04 LTS:\n  linux-image-4.4.0-45-generic    4.4.0-45.66\n  linux-image-4.4.0-45-generic-lpae  4.4.0-45.66\n  linux-image-4.4.0-45-lowlatency  4.4.0-45.66\n  linux-image-4.4.0-45-powerpc-e500mc  4.4.0-45.66\n  linux-image-4.4.0-45-powerpc-smp  4.4.0-45.66\n  linux-image-4.4.0-45-powerpc64-emb  4.4.0-45.66\n  linux-image-4.4.0-45-powerpc64-smp  4.4.0-45.66\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. Login to the Operations Agent system with root privileges  \n2. Update the system using 'yum update kernel' command\n3. Reboot the server using '/sbin/shutdown -r now' command\n\nPlease contact HPE Technical Support if any assistance is needed regarding\nthe mitigation steps. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: kernel security update\nAdvisory ID:       RHSA-2016:2105-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2016-2105.html\nIssue date:        2016-10-25\nCVE Names:         CVE-2016-5195 \n=====================================================================\n\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 6. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. An unprivileged, local user could use this flaw to gain write\naccess to otherwise read-only memory mappings and thus increase their\nprivileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1384344 - CVE-2016-5195 kernel: mm: privilege escalation via MAP_PRIVATE COW breakage\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nkernel-2.6.32-642.6.2.el6.src.rpm\n\ni386:\nkernel-2.6.32-642.6.2.el6.i686.rpm\nkernel-debug-2.6.32-642.6.2.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nkernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm\nkernel-devel-2.6.32-642.6.2.el6.i686.rpm\nkernel-headers-2.6.32-642.6.2.el6.i686.rpm\nperf-2.6.32-642.6.2.el6.i686.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-642.6.2.el6.noarch.rpm\nkernel-doc-2.6.32-642.6.2.el6.noarch.rpm\nkernel-firmware-2.6.32-642.6.2.el6.noarch.rpm\n\nx86_64:\nkernel-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debug-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm\nkernel-debug-devel-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm\nkernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-devel-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-headers-2.6.32-642.6.2.el6.x86_64.rpm\nperf-2.6.32-642.6.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.i686.rpm\npython-perf-2.6.32-642.6.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\npython-perf-2.6.32-642.6.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nkernel-2.6.32-642.6.2.el6.src.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-642.6.2.el6.noarch.rpm\nkernel-doc-2.6.32-642.6.2.el6.noarch.rpm\nkernel-firmware-2.6.32-642.6.2.el6.noarch.rpm\n\nx86_64:\nkernel-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debug-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm\nkernel-debug-devel-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm\nkernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-devel-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-headers-2.6.32-642.6.2.el6.x86_64.rpm\nperf-2.6.32-642.6.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\npython-perf-2.6.32-642.6.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nkernel-2.6.32-642.6.2.el6.src.rpm\n\ni386:\nkernel-2.6.32-642.6.2.el6.i686.rpm\nkernel-debug-2.6.32-642.6.2.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nkernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm\nkernel-devel-2.6.32-642.6.2.el6.i686.rpm\nkernel-headers-2.6.32-642.6.2.el6.i686.rpm\nperf-2.6.32-642.6.2.el6.i686.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-642.6.2.el6.noarch.rpm\nkernel-doc-2.6.32-642.6.2.el6.noarch.rpm\nkernel-firmware-2.6.32-642.6.2.el6.noarch.rpm\n\nppc64:\nkernel-2.6.32-642.6.2.el6.ppc64.rpm\nkernel-bootwrapper-2.6.32-642.6.2.el6.ppc64.rpm\nkernel-debug-2.6.32-642.6.2.el6.ppc64.rpm\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm\nkernel-debug-devel-2.6.32-642.6.2.el6.ppc64.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm\nkernel-debuginfo-common-ppc64-2.6.32-642.6.2.el6.ppc64.rpm\nkernel-devel-2.6.32-642.6.2.el6.ppc64.rpm\nkernel-headers-2.6.32-642.6.2.el6.ppc64.rpm\nperf-2.6.32-642.6.2.el6.ppc64.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm\n\ns390x:\nkernel-2.6.32-642.6.2.el6.s390x.rpm\nkernel-debug-2.6.32-642.6.2.el6.s390x.rpm\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.s390x.rpm\nkernel-debug-devel-2.6.32-642.6.2.el6.s390x.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.s390x.rpm\nkernel-debuginfo-common-s390x-2.6.32-642.6.2.el6.s390x.rpm\nkernel-devel-2.6.32-642.6.2.el6.s390x.rpm\nkernel-headers-2.6.32-642.6.2.el6.s390x.rpm\nkernel-kdump-2.6.32-642.6.2.el6.s390x.rpm\nkernel-kdump-debuginfo-2.6.32-642.6.2.el6.s390x.rpm\nkernel-kdump-devel-2.6.32-642.6.2.el6.s390x.rpm\nperf-2.6.32-642.6.2.el6.s390x.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.s390x.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.s390x.rpm\n\nx86_64:\nkernel-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debug-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm\nkernel-debug-devel-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm\nkernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-devel-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-headers-2.6.32-642.6.2.el6.x86_64.rpm\nperf-2.6.32-642.6.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.i686.rpm\npython-perf-2.6.32-642.6.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm\n\nppc64:\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm\nkernel-debuginfo-common-ppc64-2.6.32-642.6.2.el6.ppc64.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm\npython-perf-2.6.32-642.6.2.el6.ppc64.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.ppc64.rpm\n\ns390x:\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.s390x.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.s390x.rpm\nkernel-debuginfo-common-s390x-2.6.32-642.6.2.el6.s390x.rpm\nkernel-kdump-debuginfo-2.6.32-642.6.2.el6.s390x.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.s390x.rpm\npython-perf-2.6.32-642.6.2.el6.s390x.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.s390x.rpm\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\npython-perf-2.6.32-642.6.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nkernel-2.6.32-642.6.2.el6.src.rpm\n\ni386:\nkernel-2.6.32-642.6.2.el6.i686.rpm\nkernel-debug-2.6.32-642.6.2.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nkernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm\nkernel-devel-2.6.32-642.6.2.el6.i686.rpm\nkernel-headers-2.6.32-642.6.2.el6.i686.rpm\nperf-2.6.32-642.6.2.el6.i686.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-642.6.2.el6.noarch.rpm\nkernel-doc-2.6.32-642.6.2.el6.noarch.rpm\nkernel-firmware-2.6.32-642.6.2.el6.noarch.rpm\n\nx86_64:\nkernel-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debug-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-642.6.2.el6.i686.rpm\nkernel-debug-devel-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm\nkernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-devel-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-headers-2.6.32-642.6.2.el6.x86_64.rpm\nperf-2.6.32-642.6.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-642.6.2.el6.i686.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.i686.rpm\npython-perf-2.6.32-642.6.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.i686.rpm\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-642.6.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\npython-perf-2.6.32-642.6.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-642.6.2.el6.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2016-5195\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/2706661\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2016 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD4DBQFYEJcBXlSAg2UNWIIRAiWLAKCCzQq/hlgGpFbZwm1VmGEtsf8qbwCYhOVp\ncoEi7YBOAF6JIj/7g1jNNg==\n=enSu\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. 6.5) - noarch, x86_64\n\n3. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05341463\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c05341463\nVersion: 1\n\nHPSBHF03682 rev.1 - HPE Comware 7 Network Products using SSL/TLS, Local Gain\nPrivileged Access\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2016-11-23\nLast Updated: 2016-11-23\n\nPotential Security Impact: Local: Gain Privileged Access\n\nSource: Hewlett Packard Enterprise, Product Security Response Team\n\nVULNERABILITY SUMMARY\nA security vulnerability in the Linux kernel could potentially impact HPE\nComware 7 network products. The vulnerability could be exploited locally to\ngain privileged access. \n\nReferences:\n\n  - CVE-2016-5195 - Local Gain Privileged Access, aka \"Dirty COW\"\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\n  - Comware 7 (CW7) Products All Versions - Please refer to the RESOLUTION\nbelow for a list of impacted products. \n\nBACKGROUND\n\n  CVSS Base Metrics\n  =================\n  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n    CVE-2016-5195\n      7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\n      7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)\n\n    Information on CVSS is documented in\n    HPE Customer Notice HPSN-2008-002 here:\n\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499\n\nRESOLUTION\n\nHPE has provided the following mitigation information from H3C to resolve the\nvulnerability for all Comware 7 products. \n\n**Mitigation Information:**\n\nComware v7 products are potentially vulnerable because Comware v7 uses an\naffected version of the Linux kernel.  However, the risk is mitigated because\nComware v7 does not provide an interface that allows access to memory. \nCustomers should always ensure that only software images provided directly\nfrom HPE are loaded on the switch. \n\n**Notes:**\n\n  - Comware v5 is not vulnerable to this issue. \n  - HPE plans to resolve this vulnerability completely in future software\nreleases for Comware V7. \n\n\n**COMWARE 7 Products**\n\n  + **12500 (Comware 7) - Version: See Mitigation**\n    * HP Network Products\n      - JC072B HP 12500 Main Processing Unit\n      - JC085A HP A12518 Switch Chassis\n      - JC086A HP A12508 Switch Chassis\n      - JC652A HP 12508 DC Switch Chassis\n      - JC653A HP 12518 DC Switch Chassis\n      - JC654A HP 12504 AC Switch Chassis\n      - JC655A HP 12504 DC Switch Chassis\n      - JF430A HP A12518 Switch Chassis\n      - JF430B HP 12518 Switch Chassis\n      - JF430C HP 12518 AC Switch Chassis\n      - JF431A HP A12508 Switch Chassis\n      - JF431B HP 12508 Switch Chassis\n      - JF431C HP 12508 AC Switch Chassis\n      - JG497A HP 12500 MPU w/Comware V7 OS\n      - JG782A HP FF 12508E AC Switch Chassis\n      - JG783A HP FF 12508E DC Switch Chassis\n      - JG784A HP FF 12518E AC Switch Chassis\n      - JG785A HP FF 12518E DC Switch Chassis\n      - JG802A HP FF 12500E MPU\n  + **10500 (Comware 7) - Version: See Mitigation**\n    * HP Network Products\n      - JC611A HP 10508-V Switch Chassis\n      - JC612A HP 10508 Switch Chassis\n      - JC613A HP 10504 Switch Chassis\n      - JC748A HP 10512 Switch Chassis\n      - JG608A HP FlexFabric 11908-V Switch Chassis\n      - JG609A HP FlexFabric 11900 Main Processing Unit\n      - JG820A HP 10504 TAA Switch Chassis\n      - JG821A HP 10508 TAA Switch Chassis\n      - JG822A HP 10508-V TAA Switch Chassis\n      - JG823A HP 10512 TAA Switch Chassis\n      - JG496A HP 10500 Type A MPU w/Comware v7 OS\n      - JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating\nSystem\n      - JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System\nMain Processing Unit\n  + **12900 (Comware 7) - Version: See Mitigation**\n    * HP Network Products\n      - JG619A HP FlexFabric 12910 Switch AC Chassis\n      - JG621A HP FlexFabric 12910 Main Processing Unit\n      - JG632A HP FlexFabric 12916 Switch AC Chassis\n      - JG634A HP FlexFabric 12916 Main Processing Unit\n      - JH104A HP FlexFabric 12900E Main Processing Unit\n      - JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit\n      - JH263A HP FlexFabric 12904E Main Processing Unit\n      - JH255A HP FlexFabric 12908E Switch Chassis\n      - JH262A HP FlexFabric 12904E Switch Chassis\n      - JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis\n      - JH103A HP FlexFabric 12916E Switch Chassis\n  + **5900 (Comware 7) - Version: See Mitigation**\n    * HP Network Products\n      - JC772A HP 5900AF-48XG-4QSFP+ Switch\n      - JG296A HP 5920AF-24XG Switch\n      - JG336A HP 5900AF-48XGT-4QSFP+ Switch\n      - JG510A HP 5900AF-48G-4XG-2QSFP+ Switch\n      - JG554A HP 5900AF-48XG-4QSFP+ TAA Switch\n      - JG555A HP 5920AF-24XG TAA Switch\n      - JG838A HP FF 5900CP-48XG-4QSFP+ Switch\n      - JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant\n      - JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch\n      - JH038A HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant\n  + **MSR1000 (Comware 7) - Version: See Mitigation**\n    * HP Network Products\n      - JG875A HP MSR1002-4 AC Router\n      - JH060A HP MSR1003-8S AC Router\n  + **MSR2000 (Comware 7) - Version: See Mitigation**\n    * HP Network Products\n      - JG411A HP MSR2003 AC Router\n      - JG734A HP MSR2004-24 AC Router\n      - JG735A HP MSR2004-48 Router\n      - JG866A HP MSR2003 TAA-compliant AC Router\n  + **MSR3000 (Comware 7) - Version: See Mitigation**\n    * HP Network Products\n      - JG404A HP MSR3064 Router\n      - JG405A HP MSR3044 Router\n      - JG406A HP MSR3024 AC Router\n      - JG407A HP MSR3024 DC Router\n      - JG408A HP MSR3024 PoE Router\n      - JG409A HP MSR3012 AC Router\n      - JG410A HP MSR3012 DC Router\n      - JG861A HP MSR3024 TAA-compliant AC Router\n  + **MSR4000 (Comware 7) - Version: See Mitigation**\n    * HP Network Products\n      - JG402A HP MSR4080 Router Chassis\n      - JG403A HP MSR4060 Router Chassis\n      - JG412A HP MSR4000 MPU-100 Main Processing Unit\n      - JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit\n  + **MSR95X - Version: See Mitigation**\n    * HP Network Products\n      - JH296A HPE MSR954 1GbE SFP 2GbE-WAN 4GbE-LAN CWv7 Router\n      - JH297A HPE MSR954-W 1GbE SFP (WW) 2GbE-WAN 4GbE-LAN Wireless 802.11n\nCWv7 Router\n      - JH298A HPE MSR954-W 1GbE SFP LTE (AM) 2GbE-WAN 4GbE-LAN Wireless\n802.11n CWv7 Router\n      - JH299A HPE MSR954-W 1GbE SFP LTE (WW) 2GbE-WAN 4GbE-LAN Wireless\n802.11n CWv7 Router\n      - JH300A HPE FlexNetwork MSR958 1GbE and Combo 2GbE WAN 8GbE LAN Router\n      - JH301A HPE FlexNetwork MSR958 1GbE and Combo 2GbE WAN 8GbE LAN PoE\nRouter\n  + **VSR (Comware 7) - Version: See Mitigation**\n    * HP Network Products\n      - JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation\nSoftware\n      - JG811AAE HP VSR1001 Comware 7 Virtual Services Router\n      - JG812AAE HP VSR1004 Comware 7 Virtual Services Router\n      - JG813AAE HP VSR1008 Comware 7 Virtual Services Router\n  + **7900 (Comware 7) - Version: See Mitigation**\n    * HP Network Products\n      - JG682A HP FlexFabric 7904 Switch Chassis\n      - JG841A HP FlexFabric 7910 Switch Chassis\n      - JG842A HP FlexFabric 7910 7.2Tbps Fabric / Main Processing Unit\n      - JH001A HP FlexFabric 7910 2.4Tbps Fabric / Main Processing Unit\n      - JH122A HP FlexFabric 7904 TAA-compliant Switch Chassis\n      - JH123A HP FlexFabric 7910 TAA-compliant Switch Chassis\n      - JH124A HP FlexFabric 7910 7.2Tbps TAA-compliant Fabric/Main\nProcessing Unit\n      - JH125A HP FlexFabric 7910 2.4Tbps TAA-compliant Fabric/Main\nProcessing Unit\n  + **5130EI (Comware 7) - Version: See Mitigation**\n    * HP Network Products\n      - JG932A HP 5130-24G-4SFP+ EI Switch\n      - JG933A HP 5130-24G-SFP-4SFP+ EI Switch\n      - JG934A HP 5130-48G-4SFP+ EI Switch\n      - JG936A HP 5130-24G-PoE+-4SFP+ (370W) EI Switch\n      - JG937A HP 5130-48G-PoE+-4SFP+ (370W) EI Switch\n      - JG938A HP 5130-24G-2SFP+-2XGT EI Switch\n      - JG939A HP 5130-48G-2SFP+-2XGT EI Switch\n      - JG940A HP 5130-24G-PoE+-2SFP+-2XGT (370W) EI Switch\n      - JG941A HP 5130-48G-PoE+-2SFP+-2XGT (370W) EI Switch\n      - JG975A HP 5130-24G-4SFP+ EI Brazil Switch\n      - JG976A HP 5130-48G-4SFP+ EI Brazil Switch\n      - JG977A HP 5130-24G-PoE+-4SFP+ (370W) EI Brazil Switch\n      - JG978A HP 5130-48G-PoE+-4SFP+ (370W) EI Brazil Switch\n  + **6125XLG - Version: See Mitigation**\n    * HP Network Products\n      - 711307-B21 HP 6125XLG Blade Switch\n      - 737230-B21 HP 6125XLG Blade Switch with TAA\n  + **6127XLG - Version: See Mitigation**\n    * HP Network Products\n      - 787635-B21 HP 6127XLG Blade Switch Opt Kit\n      - 787635-B22 HP 6127XLG Blade Switch Opt Kit TAA\n  + **Moonshot - Version: See Mitigation**\n    * HP Network Products\n      - 786617-B21 - HP Moonshot-45Gc Switch Module\n      - 704654-B21 - HP Moonshot-45XGc Switch Module\n      - 786619-B21 - HP Moonshot-180XGc Switch Module\n  + **5700 (Comware 7) - Version: See Mitigation**\n    * HP Network Products\n      - JG894A HP FlexFabric 5700-48G-4XG-2QSFP+ Switch\n      - JG895A HP FlexFabric 5700-48G-4XG-2QSFP+ TAA-compliant Switch\n      - JG896A HP FlexFabric 5700-40XG-2QSFP+ Switch\n      - JG897A HP FlexFabric 5700-40XG-2QSFP+ TAA-compliant Switch\n      - JG898A HP FlexFabric 5700-32XGT-8XG-2QSFP+ Switch\n      - JG899A HP FlexFabric 5700-32XGT-8XG-2QSFP+ TAA-compliant Switch\n  + **5930 (Comware 7) - Version: See Mitigation**\n    * HP Network Products\n      - JG726A HP FlexFabric 5930 32QSFP+ Switch\n      - JG727A HP FlexFabric 5930 32QSFP+ TAA-compliant Switch\n      - JH178A HP FlexFabric 5930 2QSFP+ 2-slot Switch\n      - JH179A HP FlexFabric 5930 4-slot Switch\n      - JH187A HP FlexFabric 5930 2QSFP+ 2-slot TAA-compliant Switch\n      - JH188A HP FlexFabric 5930 4-slot TAA-compliant Switch\n  + **HSR6600 (Comware 7) - Version: See Mitigation**\n    * HP Network Products\n      - JG353A HP HSR6602-G Router\n      - JG354A HP HSR6602-XG Router\n      - JG776A HP HSR6602-G TAA-compliant Router\n      - JG777A HP HSR6602-XG TAA-compliant Router\n  + **HSR6800 (Comware 7) - Version: See Mitigation**\n    * HP Network Products\n      - JG361A HP HSR6802 Router Chassis\n      - JG361B HP HSR6802 Router Chassis\n      - JG362A HP HSR6804 Router Chassis\n      - JG362B HP HSR6804 Router Chassis\n      - JG363A HP HSR6808 Router Chassis\n      - JG363B HP HSR6808 Router Chassis\n      - JG364A HP HSR6800 RSE-X2 Router Main Processing Unit\n      - JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing\n      - JH075A HP HSR6800 RSE-X3 Router Main Processing Unit\n  + **1950 (Comware 7) - Version: See Mitigation**\n    * HP Network Products\n      - JG960A HP 1950-24G-4XG Switch\n      - JG961A HP 1950-48G-2SFP+-2XGT Switch\n      - JG962A HP 1950-24G-2SFP+-2XGT-PoE+(370W) Switch\n      - JG963A HP 1950-48G-2SFP+-2XGT-PoE+(370W) Switch\n  + **7500 (Comware 7) - Version: See Mitigation**\n    * HP Network Products\n      - JD238C HP 7510 Switch Chassis\n      - JD239C HP 7506 Switch Chassis\n      - JD240C HP 7503 Switch Chassis\n      - JD242C HP 7502 Switch Chassis\n      - JH207A HP 7500 1.2Tbps Fabric with 2-port 40GbE QSFP+ for IRF-Only\nMain Processing Unit\n      - JH208A HP 7502 Main Processing Unit\n      - JH209A HP 7500 2.4Tbps Fabric with 8-port 1/10GbE SFP+ and 2-port\n40GbE QSFP+ Main Processing Unit\n  + **5130HI - Version: See Mitigation**\n    * HP Network Products\n      - JH323A HPE 5130 24G 4SFP+ 1-slot HI Switch\n      - JH324A HPE 5130 48G 4SFP+ 1-slot HI Switch\n      - JH325A HPE 5130 24G PoE+ 4SFP+ 1-slot HI Switch\n      - JH326A HPE 5130 48G PoE+ 4SFP+ 1-slot HI Switch\n  + **5510HI - Version: See Mitigation**\n    * HP Network Products\n      - JH145A HPE 5510 24G 4SFP+ HI 1-slot Switch\n      - JH146A HPE 5510 48G 4SFP+ HI 1-slot Switch\n      - JH147A HPE 5510 24G PoE+ 4SFP+ HI 1-slot Switch\n      - JH148A HPE 5510 48G PoE+ 4SFP+ HI 1-slot Switch\n      - JH149A HPE 5510 24G SFP 4SFP+ HI 1-slot Switch\n  + **5950 (Comware 7) - Version: See Mitigation**\n    * HP Network Products\n      - JH321A HPE FlexFabric 5950 32QSFP28 Switch\n  + **5940 (Comware 7) - Version: See Mitigation**\n    * HP Network Products\n      - JH390A HPE FlexFabric 5940 48SFP+ 6QSFP28 Switch\n      - JH391A HPE FlexFabric 5940 48XGT 6QSFP28 Switch\n      - JH394A HPE FlexFabric 5940 48XGT 6QSFP+ Switch\n      - JH395A HPE FlexFabric 5940 48SFP+ 6QSFP+ Switch\n      - JH396A HPE FlexFabric 5940 32QSFP+ Switch\n      - JH397A HPE FlexFabric 5940 2-slot Switch\n      - JH398A HPE FlexFabric 5940 4-slot Switch\n  + **12900E - Version: See Mitigation**\n    * HP Network Products\n      - JG619A HP FlexFabric 12910 Switch AC Chassis\n      - JG621A HP FlexFabric 12910 Main Processing Unit\n      - JG632A HP FlexFabric 12916 Switch AC Chassis\n      - JG634A HP FlexFabric 12916 Main Processing Unit\n      - JH104A HP FlexFabric 12900E Main Processing Unit\n      - JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit\n      - JH263A HP FlexFabric 12904E Main Processing Unit\n      - JH255A HP FlexFabric 12908E Switch Chassis\n      - JH262A HP FlexFabric 12904E Switch Chassis\n      - JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis\n      - JH103A HP FlexFabric 12916E Switch Chassis\n\nHISTORY\nVersion:1 (rev.1) - 23 November 2016 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running Hewlett Packard Enterprise (HPE) software\nproducts should be applied in accordance with the customer's patch management\npolicy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HPE Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hpe.com. \n\nReport: To report a potential security vulnerability for any HPE supported\nproduct:\n  Web form: https://www.hpe.com/info/report-security-vulnerability\n  Email: security-alert@hpe.com\n\nSubscribe: To initiate a subscription to receive future HPE Security Bulletin\nalerts via Email: http://www.hpe.com/support/Subscriber_Choice\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here: http://www.hpe.com/support/Security_Bulletin_Archive\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HPE General Software\nHF = HPE Hardware and Firmware\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPV = ProCurve\nST = Storage Software\nUX = HP-UX\n\nCopyright 2016 Hewlett Packard Enterprise\n\nHewlett Packard Enterprise shall not be liable for technical or editorial\nerrors or omissions contained herein. The information provided is provided\n\"as is\" without warranty of any kind. To the extent permitted by law, neither\nHP or its affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. Hewlett\nPackard Enterprise and the names of Hewlett Packard Enterprise products\nreferenced herein are trademarks of Hewlett Packard Enterprise in the United\nStates and other countries. Other product and company names mentioned herein\nmay be trademarks of their respective owners",
      sources: [
         {
            db: "NVD",
            id: "CVE-2016-5195",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005596",
         },
         {
            db: "BID",
            id: "93793",
         },
         {
            db: "VULMON",
            id: "CVE-2016-5195",
         },
         {
            db: "PACKETSTORM",
            id: "139316",
         },
         {
            db: "PACKETSTORM",
            id: "139244",
         },
         {
            db: "PACKETSTORM",
            id: "139277",
         },
         {
            db: "PACKETSTORM",
            id: "141870",
         },
         {
            db: "PACKETSTORM",
            id: "139334",
         },
         {
            db: "PACKETSTORM",
            id: "139369",
         },
         {
            db: "PACKETSTORM",
            id: "139959",
         },
      ],
      trust: 2.61,
   },
   exploit_availability: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            reference: "https://vulmon.com/exploitdetails?qidtp=exploitdb&qid=40611",
            trust: 0.5,
            type: "exploit",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2016-5195",
         },
      ],
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2016-5195",
            trust: 3.5,
         },
         {
            db: "CERT/CC",
            id: "VU#243144",
            trust: 2.7,
         },
         {
            db: "JUNIPER",
            id: "JSA10770",
            trust: 1.9,
         },
         {
            db: "BID",
            id: "93793",
            trust: 1.9,
         },
         {
            db: "PACKETSTORM",
            id: "139277",
            trust: 1.7,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2022/08/08/8",
            trust: 1.6,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2016/10/30/1",
            trust: 1.6,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2022/03/07/1",
            trust: 1.6,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2016/10/21/1",
            trust: 1.6,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2022/08/08/1",
            trust: 1.6,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2022/08/15/1",
            trust: 1.6,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2022/08/08/2",
            trust: 1.6,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2022/08/08/7",
            trust: 1.6,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2016/10/26/7",
            trust: 1.6,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2022/08/09/4",
            trust: 1.6,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2016/10/27/13",
            trust: 1.6,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2016/11/03/7",
            trust: 1.6,
         },
         {
            db: "EXPLOIT-DB",
            id: "40611",
            trust: 1.6,
         },
         {
            db: "EXPLOIT-DB",
            id: "40839",
            trust: 1.6,
         },
         {
            db: "EXPLOIT-DB",
            id: "40616",
            trust: 1.6,
         },
         {
            db: "EXPLOIT-DB",
            id: "40847",
            trust: 1.6,
         },
         {
            db: "PACKETSTORM",
            id: "139922",
            trust: 1.6,
         },
         {
            db: "PACKETSTORM",
            id: "139286",
            trust: 1.6,
         },
         {
            db: "PACKETSTORM",
            id: "139923",
            trust: 1.6,
         },
         {
            db: "PACKETSTORM",
            id: "139287",
            trust: 1.6,
         },
         {
            db: "PACKETSTORM",
            id: "142151",
            trust: 1.6,
         },
         {
            db: "MCAFEE",
            id: "SB10176",
            trust: 1.6,
         },
         {
            db: "MCAFEE",
            id: "SB10222",
            trust: 1.6,
         },
         {
            db: "MCAFEE",
            id: "SB10177",
            trust: 1.6,
         },
         {
            db: "JUNIPER",
            id: "JSA10774",
            trust: 1.6,
         },
         {
            db: "JUNIPER",
            id: "JSA10807",
            trust: 1.6,
         },
         {
            db: "SECTRACK",
            id: "1037078",
            trust: 1.6,
         },
         {
            db: "JVN",
            id: "JVNVU91983575",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005596",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201610-665",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2016-5195",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "139316",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "139244",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "141870",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "139334",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "139369",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "139959",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2016-5195",
         },
         {
            db: "BID",
            id: "93793",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005596",
         },
         {
            db: "PACKETSTORM",
            id: "139316",
         },
         {
            db: "PACKETSTORM",
            id: "139244",
         },
         {
            db: "PACKETSTORM",
            id: "139277",
         },
         {
            db: "PACKETSTORM",
            id: "141870",
         },
         {
            db: "PACKETSTORM",
            id: "139334",
         },
         {
            db: "PACKETSTORM",
            id: "139369",
         },
         {
            db: "PACKETSTORM",
            id: "139959",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201610-665",
         },
         {
            db: "NVD",
            id: "CVE-2016-5195",
         },
      ],
   },
   id: "VAR-201611-0386",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.7828162515384615,
   },
   last_update_date: "2024-11-28T21:01:33.292000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Android のセキュリティに関する公開情報 - 2016 年 12 月",
            trust: 0.8,
            url: "https://source.android.com/security/bulletin/2016-12-01.html",
         },
         {
            title: "Bug 1004418",
            trust: 0.8,
            url: "https://bugzilla.suse.com/show_bug.cgi?id=1004418",
         },
         {
            title: "ChangeLog-4.4.26",
            trust: 0.8,
            url: "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.26",
         },
         {
            title: "ChangeLog-4.7.9",
            trust: 0.8,
            url: "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.9",
         },
         {
            title: "ChangeLog-4.8.3",
            trust: 0.8,
            url: "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3",
         },
         {
            title: "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()",
            trust: 0.8,
            url: "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619",
         },
         {
            title: "HPSBGN03681",
            trust: 0.8,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241",
         },
         {
            title: "Linux Kernel Archives",
            trust: 0.8,
            url: "http://www.kernel.org",
         },
         {
            title: "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()",
            trust: 0.8,
            url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619",
         },
         {
            title: "SB10176",
            trust: 0.8,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10176",
         },
         {
            title: "NV17-005",
            trust: 0.8,
            url: "http://jpn.nec.com/security-info/secinfo/nv17-005.html",
         },
         {
            title: "Bug 1384344",
            trust: 0.8,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1384344",
         },
         {
            title: "CVE-2016-5195",
            trust: 0.8,
            url: "https://access.redhat.com/security/cve/cve-2016-5195",
         },
         {
            title: "Kernel Local Privilege Escalation \"Dirty COW\" - CVE-2016-5195",
            trust: 0.8,
            url: "https://access.redhat.com/security/vulnerabilities/2706661",
         },
         {
            title: "SA134",
            trust: 0.8,
            url: "https://bto.bluecoat.com/security-advisory/sa134",
         },
         {
            title: "CVE-2016-5195",
            trust: 0.8,
            url: "https://security-tracker.debian.org/tracker/CVE-2016-5195",
         },
         {
            title: "CVE-2016-5195",
            trust: 0.8,
            url: "http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html",
         },
         {
            title: "Linux kernel Remedial measures for local privilege escalation",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=64976",
         },
         {
            title: "Red Hat: Important: kernel-rt security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162110 - Security Advisory",
         },
         {
            title: "Red Hat: Important: kernel security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162124 - Security Advisory",
         },
         {
            title: "Red Hat: Important: kernel security and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162128 - Security Advisory",
         },
         {
            title: "Red Hat: Important: kernel security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162126 - Security Advisory",
         },
         {
            title: "Red Hat: Important: kernel security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162106 - Security Advisory",
         },
         {
            title: "Red Hat: Important: kernel security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162127 - Security Advisory",
         },
         {
            title: "Red Hat: Important: kernel security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162120 - Security Advisory",
         },
         {
            title: "Red Hat: Important: kernel security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162132 - Security Advisory",
         },
         {
            title: "Red Hat: Important: kernel security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162118 - Security Advisory",
         },
         {
            title: "Red Hat: Important: kernel security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162098 - Security Advisory",
         },
         {
            title: "Red Hat: Important: kernel security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162105 - Security Advisory",
         },
         {
            title: "Red Hat: Important: kernel security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162133 - Security Advisory",
         },
         {
            title: "Red Hat: Important: kernel-rt security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20162107 - Security Advisory",
         },
         {
            title: "Ubuntu Security Notice: linux-snapdragon vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3106-4",
         },
         {
            title: "Ubuntu Security Notice: linux-raspi2 vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3107-2",
         },
         {
            title: "Ubuntu Security Notice: linux vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3107-1",
         },
         {
            title: "Ubuntu Security Notice: linux vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3104-1",
         },
         {
            title: "Ubuntu Security Notice: linux-raspi2 vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3106-3",
         },
         {
            title: "Ubuntu Security Notice: linux vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3105-1",
         },
         {
            title: "Ubuntu Security Notice: linux-lts-trusty vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3105-2",
         },
         {
            title: "Ubuntu Security Notice: linux-ti-omap4 vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3104-2",
         },
         {
            title: "Ubuntu Security Notice: linux vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3106-1",
         },
         {
            title: "Ubuntu Security Notice: linux-lts-xenial vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3106-2",
         },
         {
            title: "Cisco: Cisco TelePresence Video Communication Server Test Validation Script Issue",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20181107-vcsd",
         },
         {
            title: "dirty-cow-toolkit",
            trust: 0.1,
            url: "https://github.com/roliboy/rootcow ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/yatt-ze/DirtyCowAndroid ",
         },
         {
            title: "polaris-dict-a63-arch",
            trust: 0.1,
            url: "https://github.com/zaoqi/polaris-dict-a63-arch ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2016-5195",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005596",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201610-665",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-362",
            trust: 1.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-005596",
         },
         {
            db: "NVD",
            id: "CVE-2016-5195",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.7,
            url: "https://www.kb.cert.org/vuls/id/243144",
         },
         {
            trust: 2.2,
            url: "http://www.securityfocus.com/bid/93793",
         },
         {
            trust: 2,
            url: "http://rhn.redhat.com/errata/rhsa-2016-2120.html",
         },
         {
            trust: 1.9,
            url: "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619",
         },
         {
            trust: 1.9,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1384344",
         },
         {
            trust: 1.9,
            url: "https://source.android.com/security/bulletin/2016-12-01.html",
         },
         {
            trust: 1.9,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en",
         },
         {
            trust: 1.9,
            url: "https://github.com/dirtycow/dirtycow.github.io/wiki/pocs",
         },
         {
            trust: 1.9,
            url: "http://rhn.redhat.com/errata/rhsa-2016-2118.html",
         },
         {
            trust: 1.9,
            url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-linux",
         },
         {
            trust: 1.9,
            url: "https://github.com/dirtycow/dirtycow.github.io/wiki/vulnerabilitydetails",
         },
         {
            trust: 1.8,
            url: "https://access.redhat.com/security/vulnerabilities/2706661",
         },
         {
            trust: 1.8,
            url: "https://access.redhat.com/security/cve/cve-2016-5195",
         },
         {
            trust: 1.7,
            url: "http://www.ubuntu.com/usn/usn-3107-1",
         },
         {
            trust: 1.7,
            url: "http://www.ubuntu.com/usn/usn-3107-2",
         },
         {
            trust: 1.7,
            url: "http://www.ubuntu.com/usn/usn-3106-1",
         },
         {
            trust: 1.7,
            url: "http://rhn.redhat.com/errata/rhsa-2016-2105.html",
         },
         {
            trust: 1.6,
            url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03722en_us",
         },
         {
            trust: 1.6,
            url: "https://security.paloaltonetworks.com/cve-2016-5195",
         },
         {
            trust: 1.6,
            url: "http://www.openwall.com/lists/oss-security/2022/03/07/1",
         },
         {
            trust: 1.6,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05347541",
         },
         {
            trust: 1.6,
            url: "http://www.ubuntu.com/usn/usn-3106-4",
         },
         {
            trust: 1.6,
            url: "http://www.ubuntu.com/usn/usn-3106-3",
         },
         {
            trust: 1.6,
            url: "http://www.ubuntu.com/usn/usn-3106-2",
         },
         {
            trust: 1.6,
            url: "http://www.securityfocus.com/archive/1/539611/100/0/threaded",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html",
         },
         {
            trust: 1.6,
            url: "http://www.openwall.com/lists/oss-security/2016/10/21/1",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html",
         },
         {
            trust: 1.6,
            url: "http://packetstormsecurity.com/files/139922/linux-kernel-dirty-cow-ptrace_pokedata-privilege-escalation.html",
         },
         {
            trust: 1.6,
            url: "http://packetstormsecurity.com/files/139277/kernel-live-patch-security-notice-lsn-0012-1.html",
         },
         {
            trust: 1.6,
            url: "http://www.openwall.com/lists/oss-security/2016/10/27/13",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html",
         },
         {
            trust: 1.6,
            url: "http://www.openwall.com/lists/oss-security/2022/08/09/4",
         },
         {
            trust: 1.6,
            url: "http://packetstormsecurity.com/files/139923/linux-kernel-dirty-cow-ptrace_pokedata-privilege-escalation.html",
         },
         {
            trust: 1.6,
            url: "http://rhn.redhat.com/errata/rhsa-2016-2127.html",
         },
         {
            trust: 1.6,
            url: "http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded",
         },
         {
            trust: 1.6,
            url: "http://rhn.redhat.com/errata/rhsa-2016-2132.html",
         },
         {
            trust: 1.6,
            url: "http://www.securitytracker.com/id/1037078",
         },
         {
            trust: 1.6,
            url: "http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded",
         },
         {
            trust: 1.6,
            url: "https://dirtycow.ninja",
         },
         {
            trust: 1.6,
            url: "http://packetstormsecurity.com/files/139286/dirtycow-linux-kernel-race-condition.html",
         },
         {
            trust: 1.6,
            url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20181107-vcsd",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html",
         },
         {
            trust: 1.6,
            url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03742en_us",
         },
         {
            trust: 1.6,
            url: "http://www.securityfocus.com/archive/1/540344/100/0/threaded",
         },
         {
            trust: 1.6,
            url: "https://www.exploit-db.com/exploits/40839/",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html",
         },
         {
            trust: 1.6,
            url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c05352241",
         },
         {
            trust: 1.6,
            url: "http://www.openwall.com/lists/oss-security/2016/10/26/7",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html",
         },
         {
            trust: 1.6,
            url: "http://www.debian.org/security/2016/dsa-3696",
         },
         {
            trust: 1.6,
            url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03707en_us",
         },
         {
            trust: 1.6,
            url: "http://rhn.redhat.com/errata/rhsa-2016-2128.html",
         },
         {
            trust: 1.6,
            url: "https://people.canonical.com/~ubuntu-security/cve/2016/cve-2016-5195.html",
         },
         {
            trust: 1.6,
            url: "https://security-tracker.debian.org/tracker/cve-2016-5195",
         },
         {
            trust: 1.6,
            url: "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619",
         },
         {
            trust: 1.6,
            url: "http://www.securityfocus.com/archive/1/540736/100/0/threaded",
         },
         {
            trust: 1.6,
            url: "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html",
         },
         {
            trust: 1.6,
            url: "https://security.netapp.com/advisory/ntap-20161025-0001/",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html",
         },
         {
            trust: 1.6,
            url: "http://rhn.redhat.com/errata/rhsa-2016-2107.html",
         },
         {
            trust: 1.6,
            url: "https://www.exploit-db.com/exploits/40611/",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html",
         },
         {
            trust: 1.6,
            url: "http://www.openwall.com/lists/oss-security/2016/10/30/1",
         },
         {
            trust: 1.6,
            url: "https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03761en_us",
         },
         {
            trust: 1.6,
            url: "http://www.ubuntu.com/usn/usn-3104-2",
         },
         {
            trust: 1.6,
            url: "http://www.ubuntu.com/usn/usn-3104-1",
         },
         {
            trust: 1.6,
            url: "http://packetstormsecurity.com/files/142151/kernel-live-patch-security-notice-lsn-0021-1.html",
         },
         {
            trust: 1.6,
            url: "http://packetstormsecurity.com/files/139287/dirtycow-local-root-proof-of-concept.html",
         },
         {
            trust: 1.6,
            url: "http://rhn.redhat.com/errata/rhsa-2016-2106.html",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html",
         },
         {
            trust: 1.6,
            url: "https://access.redhat.com/errata/rhsa-2017:0372",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html",
         },
         {
            trust: 1.6,
            url: "http://rhn.redhat.com/errata/rhsa-2016-2098.html",
         },
         {
            trust: 1.6,
            url: "https://source.android.com/security/bulletin/2016-11-01.html",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html",
         },
         {
            trust: 1.6,
            url: "http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded",
         },
         {
            trust: 1.6,
            url: "http://www.openwall.com/lists/oss-security/2016/11/03/7",
         },
         {
            trust: 1.6,
            url: "http://www.securityfocus.com/archive/1/540252/100/0/threaded",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html",
         },
         {
            trust: 1.6,
            url: "http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html",
         },
         {
            trust: 1.6,
            url: "https://bugzilla.suse.com/show_bug.cgi?id=1004418",
         },
         {
            trust: 1.6,
            url: "https://bto.bluecoat.com/security-advisory/sa134",
         },
         {
            trust: 1.6,
            url: "http://rhn.redhat.com/errata/rhsa-2016-2110.html",
         },
         {
            trust: 1.6,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05352241",
         },
         {
            trust: 1.6,
            url: "http://rhn.redhat.com/errata/rhsa-2016-2124.html",
         },
         {
            trust: 1.6,
            url: "http://fortiguard.com/advisory/fg-ir-16-063",
         },
         {
            trust: 1.6,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10176",
         },
         {
            trust: 1.6,
            url: "https://www.exploit-db.com/exploits/40847/",
         },
         {
            trust: 1.6,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10177",
         },
         {
            trust: 1.6,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10807",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html",
         },
         {
            trust: 1.6,
            url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05341463",
         },
         {
            trust: 1.6,
            url: "http://www.ubuntu.com/usn/usn-3105-2",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html",
         },
         {
            trust: 1.6,
            url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026",
         },
         {
            trust: 1.6,
            url: "http://www.openwall.com/lists/oss-security/2022/08/08/1",
         },
         {
            trust: 1.6,
            url: "http://www.openwall.com/lists/oss-security/2022/08/08/2",
         },
         {
            trust: 1.6,
            url: "http://www.ubuntu.com/usn/usn-3105-1",
         },
         {
            trust: 1.6,
            url: "http://rhn.redhat.com/errata/rhsa-2016-2126.html",
         },
         {
            trust: 1.6,
            url: "http://www.kernel.org/pub/linux/kernel/v4.x/changelog-4.8.3",
         },
         {
            trust: 1.6,
            url: "https://www.exploit-db.com/exploits/40616/",
         },
         {
            trust: 1.6,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10222",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html",
         },
         {
            trust: 1.6,
            url: "https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes",
         },
         {
            trust: 1.6,
            url: "http://rhn.redhat.com/errata/rhsa-2016-2133.html",
         },
         {
            trust: 1.6,
            url: "http://www.openwall.com/lists/oss-security/2022/08/08/7",
         },
         {
            trust: 1.6,
            url: "http://www.openwall.com/lists/oss-security/2022/08/08/8",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html",
         },
         {
            trust: 1.6,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10770",
         },
         {
            trust: 1.6,
            url: "http://www.openwall.com/lists/oss-security/2022/08/15/1",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html",
         },
         {
            trust: 1.6,
            url: "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html",
         },
         {
            trust: 1.6,
            url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10774",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/e7m62srp6czlj4zxcrzkv4wplqbsr7dt/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/nwmdlbwmgzkfhmrj7quqvcerp5qhdb6w/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/w3aprvdvpdbxlh4dc5ukzvcr742mjim3/",
         },
         {
            trust: 0.9,
            url: "http://securityadvisories.paloaltonetworks.com/home/detail/73",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5195",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu91983575/index.html",
         },
         {
            trust: 0.8,
            url: "https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-5195",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-5195",
         },
         {
            trust: 0.6,
            url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/nwmdlbwmgzkfhmrj7quqvcerp5qhdb6w/",
         },
         {
            trust: 0.6,
            url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/e7m62srp6czlj4zxcrzkv4wplqbsr7dt/",
         },
         {
            trust: 0.6,
            url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/w3aprvdvpdbxlh4dc5ukzvcr742mjim3/",
         },
         {
            trust: 0.6,
            url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-cn",
         },
         {
            trust: 0.4,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05341463",
         },
         {
            trust: 0.3,
            url: "https://github.com/amluto/vulnerabilities/blob/master/others/cve-2016-5195/test_cve-2016-5195.c",
         },
         {
            trust: 0.3,
            url: "https://dirtycow.ninja/",
         },
         {
            trust: 0.3,
            url: "http://www.kernel.org/",
         },
         {
            trust: 0.3,
            url: "https://googlechromereleases.blogspot.in/2016/10/stable-channel-update-for-chrome-os_26.html",
         },
         {
            trust: 0.3,
            url: "https://kb.vmware.com/selfservice/microsites/search.do?language=en_us&cmd=displaykc&externalid=2147515",
         },
         {
            trust: 0.3,
            url: "https://kb.juniper.net/infocenter/index?page=content&id=jsa10770&actp=rss",
         },
         {
            trust: 0.3,
            url: "https://help.virtuozzo.com/customer/portal/articles/2613795",
         },
         {
            trust: 0.3,
            url: "https://help.virtuozzo.com/customer/portal/articles/2613794",
         },
         {
            trust: 0.3,
            url: "http://kb.odin.com/en/129683",
         },
         {
            trust: 0.3,
            url: "https://github.com/timwr/cve-2016-5195",
         },
         {
            trust: 0.3,
            url: "https://forum.proxmox.com/threads/cve-2016-5195-dirty-cow.29908/",
         },
         {
            trust: 0.3,
            url: "https://centos.org/forums/viewtopic.php?f=51&p=252514",
         },
         {
            trust: 0.3,
            url: "https://www.cloudlinux.com/kernelcare-blog/entry/dirty-cow-vulnerability-the-fix-is-coming",
         },
         {
            trust: 0.3,
            url: "https://security-tracker.debian.org/tracker/dla-670-1",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05347541",
         },
         {
            trust: 0.3,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05352241",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/support/docview.wss?uid=isg3t1024478",
         },
         {
            trust: 0.3,
            url: "https://coreos.com/blog/cve-2016-5195.html",
         },
         {
            trust: 0.3,
            url: "https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=9691eac5593ff1e2f82391ad327f21d90322aec1",
         },
         {
            trust: 0.3,
            url: "https://gryzli.info/2016/10/21/protect-cve-2016-5195-dirtycow-centos-7rhel7cpanelcloudlinux/",
         },
         {
            trust: 0.3,
            url: "https://kc.mcafee.com/resources/sites/mcafee/content/live/product_documentation/27000/pd27128/en_us/meg_7_6_406_3402_103_release_notes_en_us.pdf",
         },
         {
            trust: 0.3,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21995667",
         },
         {
            trust: 0.3,
            url: "https://www.ubuntu.com/usn/usn-3104-1/",
         },
         {
            trust: 0.3,
            url: "https://www.ubuntu.com/usn/usn-3105-1/",
         },
         {
            trust: 0.3,
            url: "https://www.ubuntu.com/usn/usn-3105-2/",
         },
         {
            trust: 0.3,
            url: "https://www.ubuntu.com/usn/usn-3106-1/",
         },
         {
            trust: 0.3,
            url: "https://www.ubuntu.com/usn/usn-3106-2/",
         },
         {
            trust: 0.3,
            url: "https://www.ubuntu.com/usn/usn-3106-3/",
         },
         {
            trust: 0.3,
            url: "https://www.ubuntu.com/usn/usn-3106-4/",
         },
         {
            trust: 0.3,
            url: "https://www.ubuntu.com/usn/usn-3107-1/",
         },
         {
            trust: 0.3,
            url: "https://help.virtuozzo.com/customer/en/portal/articles/2613793",
         },
         {
            trust: 0.3,
            url: "http://www.vmware.com/security/advisories/vmsa-2016-0018.html",
         },
         {
            trust: 0.2,
            url: "http://www.hpe.com/support/security_bulletin_archive",
         },
         {
            trust: 0.2,
            url: "https://www.hpe.com/info/report-security-vulnerability",
         },
         {
            trust: 0.2,
            url: "http://www.hpe.com/support/subscriber_choice",
         },
         {
            trust: 0.2,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499",
         },
         {
            trust: 0.2,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.2,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/team/key/",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/linux-raspi2/4.8.0-1017.20",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/linux/4.4.0-45.66",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-8666",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-7039",
         },
         {
            trust: 0.1,
            url: "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbgn03722en_us",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "93793",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005596",
         },
         {
            db: "PACKETSTORM",
            id: "139316",
         },
         {
            db: "PACKETSTORM",
            id: "139244",
         },
         {
            db: "PACKETSTORM",
            id: "139277",
         },
         {
            db: "PACKETSTORM",
            id: "141870",
         },
         {
            db: "PACKETSTORM",
            id: "139334",
         },
         {
            db: "PACKETSTORM",
            id: "139369",
         },
         {
            db: "PACKETSTORM",
            id: "139959",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201610-665",
         },
         {
            db: "NVD",
            id: "CVE-2016-5195",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2016-5195",
         },
         {
            db: "BID",
            id: "93793",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2016-005596",
         },
         {
            db: "PACKETSTORM",
            id: "139316",
         },
         {
            db: "PACKETSTORM",
            id: "139244",
         },
         {
            db: "PACKETSTORM",
            id: "139277",
         },
         {
            db: "PACKETSTORM",
            id: "141870",
         },
         {
            db: "PACKETSTORM",
            id: "139334",
         },
         {
            db: "PACKETSTORM",
            id: "139369",
         },
         {
            db: "PACKETSTORM",
            id: "139959",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201610-665",
         },
         {
            db: "NVD",
            id: "CVE-2016-5195",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2016-11-10T00:00:00",
            db: "VULMON",
            id: "CVE-2016-5195",
         },
         {
            date: "2016-10-19T00:00:00",
            db: "BID",
            id: "93793",
         },
         {
            date: "2016-10-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-005596",
         },
         {
            date: "2016-10-24T21:34:33",
            db: "PACKETSTORM",
            id: "139316",
         },
         {
            date: "2016-10-20T15:36:35",
            db: "PACKETSTORM",
            id: "139244",
         },
         {
            date: "2016-10-20T16:14:03",
            db: "PACKETSTORM",
            id: "139277",
         },
         {
            date: "2017-03-31T16:11:41",
            db: "PACKETSTORM",
            id: "141870",
         },
         {
            date: "2016-10-26T14:02:52",
            db: "PACKETSTORM",
            id: "139334",
         },
         {
            date: "2016-10-27T22:32:00",
            db: "PACKETSTORM",
            id: "139369",
         },
         {
            date: "2016-11-30T21:26:01",
            db: "PACKETSTORM",
            id: "139959",
         },
         {
            date: "2016-10-21T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201610-665",
         },
         {
            date: "2016-11-10T21:59:00.197000",
            db: "NVD",
            id: "CVE-2016-5195",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2023-11-07T00:00:00",
            db: "VULMON",
            id: "CVE-2016-5195",
         },
         {
            date: "2017-12-19T22:37:00",
            db: "BID",
            id: "93793",
         },
         {
            date: "2017-07-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2016-005596",
         },
         {
            date: "2022-08-16T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201610-665",
         },
         {
            date: "2024-11-21T02:53:48.837000",
            db: "NVD",
            id: "CVE-2016-5195",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "BID",
            id: "93793",
         },
         {
            db: "PACKETSTORM",
            id: "139316",
         },
         {
            db: "PACKETSTORM",
            id: "139244",
         },
         {
            db: "PACKETSTORM",
            id: "139334",
         },
         {
            db: "PACKETSTORM",
            id: "139369",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201610-665",
         },
      ],
      trust: 1.3,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Linux Implemented in the kernel memory subsystem  copy-on-write Vulnerability that causes a race condition in the mechanism",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2016-005596",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "competition condition problem",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201610-665",
         },
      ],
      trust: 0.6,
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.