Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-7842 (GCVE-0-2014-7842)
Vulnerability from cvelistv5 – Published: 2014-11-30 01:00 – Updated: 2024-08-06 13:03- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T13:03:27.413Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2016:0855",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0855.html"
},
{
"name": "SUSE-SU-2015:0736",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name": "71078",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/71078"
},
{
"name": "SUSE-SU-2015:0652",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html"
},
{
"name": "[oss-security] 20141113 CVE-2014-7842 Linux kernel: kvm: reporting emulation failures to userspace",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2014/11/13/7"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2b9e6c1a35afcc0973acb72e591c714e78885ff"
},
{
"name": "62326",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62326"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/torvalds/linux/commit/a2b9e6c1a35afcc0973acb72e591c714e78885ff"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name": "SUSE-SU-2015:0481",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"
},
{
"name": "openSUSE-SU-2015:0566",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
},
{
"name": "62336",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62336"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163762"
},
{
"name": "62305",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62305"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-11-13T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-12-30T16:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2016:0855",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0855.html"
},
{
"name": "SUSE-SU-2015:0736",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name": "71078",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/71078"
},
{
"name": "SUSE-SU-2015:0652",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html"
},
{
"name": "[oss-security] 20141113 CVE-2014-7842 Linux kernel: kvm: reporting emulation failures to userspace",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2014/11/13/7"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2b9e6c1a35afcc0973acb72e591c714e78885ff"
},
{
"name": "62326",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62326"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/torvalds/linux/commit/a2b9e6c1a35afcc0973acb72e591c714e78885ff"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name": "SUSE-SU-2015:0481",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"
},
{
"name": "openSUSE-SU-2015:0566",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
},
{
"name": "62336",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62336"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163762"
},
{
"name": "62305",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62305"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2014-7842",
"datePublished": "2014-11-30T01:00:00.000Z",
"dateReserved": "2014-10-03T00:00:00.000Z",
"dateUpdated": "2024-08-06T13:03:27.413Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CERTFR-2015-AVI-498
Vulnerability from certfr_avis - Published: 2015-11-24 - Updated: 2015-11-24
De multiples vulnérabilités ont été corrigées dans les noyaux Linux Red Hat. Elles permettent à un attaquant de provoquer un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Noyaux Linux Red Hat, versions ant\u00e9rieures \u00e0 3.10.0-327",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Noyaux Linux Red Hat temps r\u00e9el, versions ant\u00e9rieures \u00e0 3.10.0-326.rt56.204",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-9419",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9419"
},
{
"name": "CVE-2014-3647",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3647"
},
{
"name": "CVE-2013-7421",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7421"
},
{
"name": "CVE-2015-3339",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3339"
},
{
"name": "CVE-2014-7842",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7842"
},
{
"name": "CVE-2015-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0239"
},
{
"name": "CVE-2015-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2925"
},
{
"name": "CVE-2015-7837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7837"
},
{
"name": "CVE-2015-4170",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4170"
},
{
"name": "CVE-2014-8171",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8171"
},
{
"name": "CVE-2015-6526",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6526"
},
{
"name": "CVE-2015-7613",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7613"
},
{
"name": "CVE-2015-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5283"
},
{
"name": "CVE-2010-5313",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-5313"
},
{
"name": "CVE-2014-9644",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9644"
}
],
"initial_release_date": "2015-11-24T00:00:00",
"last_revision_date": "2015-11-24T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2015:2152-1 du 19 novembre 2015",
"url": "https://rhn.redhat.com/errata/RHSA-2015-2152.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2015:2411-1 du 19 novembre 2015",
"url": "https://rhn.redhat.com/errata/RHSA-2015-2411.html"
}
],
"reference": "CERTFR-2015-AVI-498",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-11-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles noyaux Linux Red Hat\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les noyaux Linux Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2015:2152-1 du 19 novembre 2015",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2015:2411-1 du 19 novembre 2015",
"url": null
}
]
}
CERTFR-2015-AVI-165
Vulnerability from certfr_avis - Published: 2015-04-15 - Updated: 2015-04-15
De multiples vulnérabilités ont été corrigées dans le noyau Linux de Suse. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SLE 11 SERVER Unsupported Extras | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11 SP1 LTSS |
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SLE 11 SERVER Unsupported Extras",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11 SP1 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-9585",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9585"
},
{
"name": "CVE-2013-4299",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4299"
},
{
"name": "CVE-2014-7842",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7842"
},
{
"name": "CVE-2014-3673",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3673"
},
{
"name": "CVE-2012-6657",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6657"
},
{
"name": "CVE-2014-7841",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7841"
},
{
"name": "CVE-2014-3687",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3687"
},
{
"name": "CVE-2014-8709",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8709"
},
{
"name": "CVE-2014-8160",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8160"
},
{
"name": "CVE-2014-3185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3185"
},
{
"name": "CVE-2014-9420",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9420"
},
{
"name": "CVE-2013-7263",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7263"
},
{
"name": "CVE-2014-9584",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9584"
},
{
"name": "CVE-2014-0181",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0181"
},
{
"name": "CVE-2014-3184",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3184"
},
{
"name": "CVE-2014-3688",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3688"
},
{
"name": "CVE-2010-5313",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-5313"
}
],
"initial_release_date": "2015-04-15T00:00:00",
"last_revision_date": "2015-04-15T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Suse SUSE-SU-2015:0652-1 du 01 avril 2015",
"url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150652-1.html"
}
],
"reference": "CERTFR-2015-AVI-165",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-04-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le noyau Linux de\n\u003cspan class=\"textit\"\u003eSuse\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0\nun attaquant de provoquer un d\u00e9ni de service \u00e0 distance, un d\u00e9ni de\nservice et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Suse",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Suse SUSE-SU-2015:0652-1 du 01 avril 2015",
"url": null
}
]
}
CERTFR-2018-AVI-184
Vulnerability from certfr_avis - Published: 2018-04-16 - Updated: 2018-04-16
De multiples vulnérabilités ont été découvertes dans les produits Juniper . Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Steel-Belted Radius (SBR) Carrier 8.2.0 antérieures à 8.2.0-R18 | ||
| Juniper Networks | N/A | CTPOS versions antérieures à 7.3R4 ou 7.4R1 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 antérieures à 15.1X49-D60 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 antérieures à 15.1X49-D100 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48 antérieures à 12.3X48-D66, 12.3X48-D70 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 antérieures à 15.1X53-D59 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 antérieures à 16.1R5 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 antérieures à 15.1X53-D58 on EX2300/EX3400 | ||
| Juniper Networks | N/A | CentOS versions 6.5 antérieures à 2012.2R12 | ||
| Juniper Networks | Junos OS | Junos OS versions 14.2 antérieures à 14.2R8 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 antérieures à 16.1R3-S8, 16.1R4-S9, 16.1R5-S3, 16.1R6-S3, 16.1R7 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48 antérieures à 12.3X48-D50 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 antérieures à 15.1X53-D233 on QFX5200/QFX5110 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1X70 antérieures à 16.1X70-D10 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 antérieures à 15.1X49-D90 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 antérieures à 16.2R1-S6, 16.2R2 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 antérieures à 17.1R2 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 antérieures à 16.1R3-S8, 16.1R4-S6, 16.1R5 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 antérieures à 15.1X49-D60 | ||
| Juniper Networks | N/A | Steel-Belted Radius (SBR) Carrier versions 8.3.0.x antérieures à 8.3.0-R11 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 antérieures à 17.1R2-S6, 17.1R3 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 antérieures à 17.1R2-S3, 17.1R3 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48 antérieures à 12.3X48-D65 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 antérieures à 15.1X49-D130 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 antérieures à 15.1F2-S19, 15.1F6-S10, 15.1R4-S9, 15.1R5-S7, 15.1R6-S4, 15.1R7 | ||
| Juniper Networks | N/A | NSM versions antérieures à 2012.2R14 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2X75 antérieures à 17.2X75-D70 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48 antérieures à 12.3X48-D35 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 antérieures à 15.1X53-D66, 15.1X53-D233, 15.1X53-D471 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 antérieures à 16.2R2 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 antérieures à 15.1F6-S10, 15.1R4-S9, 15.1R6-S6, 15.1R7 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1X65 antérieures à 16.1X65-D47 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 antérieures à 15.1R4-S9, 15.1R6-S6, 15.1R7 | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1 antérieures à 14.1R10, 14.1R9 | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53 antérieures à 14.1X53-D47 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 antérieures à 16.2R1-S6, 16.2R2-S5, 16.2R3 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 antérieures à 15.1X53-D233, 15.1X53-D471, 15.1X53-D472, 15.1X53-D58, 15.1X53-D66 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3 antérieures à 12.3R12-S7, 12.3R13 | ||
| Juniper Networks | N/A | CTPView versions antérieures à 7.3R4 ou 7.4R2 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 antérieures à 15.1X53-D471 on NFX | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 antérieures à 16.1R5-S3, 16.1R7 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46 antérieures à 12.1X46-D76 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 antérieures à 15.1X53-D66 sur QFX10K | ||
| N/A | N/A | Junos Snapshot Administrator (JSNAPy) versions antérieures à 1.3.0 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2 antérieures à 17.2R1-S5, 17.2R2 | ||
| Juniper Networks | N/A | NorthStar Controller versions 3.2.x antérieures à 3.2.1 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 antérieures à 15.1F2-S20, 15.1F6-S10, 15.1R7 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46 antérieures à 12.1X46-D60 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 antérieures à 15.1X49-D131, 15.1X49-D140 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 antérieures à 15.1F5-S3, 15.1F6-S8, 15.1F7, 15.1R5 | ||
| Juniper Networks | N/A | NorthStar Controller versions 3.0.x antérieures à 3.0.1 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48 antérieures à 12.3X48-D55 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 antérieures à 17.1R1-S7, 17.1R2-S6, 17.1R3 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 antérieures à 15.1X49-D130 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 antérieures à 15.1X53-D66 sur QFX10 | ||
| Juniper Networks | N/A | Steel-Belted Radius (SBR) Carrier versions 8.4.1.x antérieures à 8.4.1-R5 | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53 antérieures à 14.1X53-D130 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 antérieures à 16.1R3-S8, 16.1R4-S8, 16.1R5 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2 antérieures à 17.2R1-S3, 17.2R2-S1, 17.2R3 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Steel-Belted Radius (SBR) Carrier 8.2.0 ant\u00e9rieures \u00e0 8.2.0-R18",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "CTPOS versions ant\u00e9rieures \u00e0 7.3R4 ou 7.4R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 ant\u00e9rieures \u00e0 15.1X49-D60 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 ant\u00e9rieures \u00e0 15.1X49-D100",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48 ant\u00e9rieures \u00e0 12.3X48-D66, 12.3X48-D70",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D59",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 ant\u00e9rieures \u00e0 16.1R5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D58 on EX2300/EX3400",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "CentOS versions 6.5 ant\u00e9rieures \u00e0 2012.2R12",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.2 ant\u00e9rieures \u00e0 14.2R8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 ant\u00e9rieures \u00e0 16.1R3-S8, 16.1R4-S9, 16.1R5-S3, 16.1R6-S3, 16.1R7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48 ant\u00e9rieures \u00e0 12.3X48-D50",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D233 on QFX5200/QFX5110",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1X70 ant\u00e9rieures \u00e0 16.1X70-D10",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 ant\u00e9rieures \u00e0 15.1X49-D90",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 ant\u00e9rieures \u00e0 16.2R1-S6, 16.2R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 ant\u00e9rieures \u00e0 17.1R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 ant\u00e9rieures \u00e0 16.1R3-S8, 16.1R4-S6, 16.1R5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 ant\u00e9rieures \u00e0 15.1X49-D60",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Steel-Belted Radius (SBR) Carrier versions 8.3.0.x ant\u00e9rieures \u00e0 8.3.0-R11",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 ant\u00e9rieures \u00e0 17.1R2-S6, 17.1R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 ant\u00e9rieures \u00e0 17.1R2-S3, 17.1R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48 ant\u00e9rieures \u00e0 12.3X48-D65",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 ant\u00e9rieures \u00e0 15.1X49-D130 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1F2-S19, 15.1F6-S10, 15.1R4-S9, 15.1R5-S7, 15.1R6-S4, 15.1R7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "NSM versions ant\u00e9rieures \u00e0 2012.2R14",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2X75 ant\u00e9rieures \u00e0 17.2X75-D70",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48 ant\u00e9rieures \u00e0 12.3X48-D35 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D66, 15.1X53-D233, 15.1X53-D471",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 ant\u00e9rieures \u00e0 16.2R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1F6-S10, 15.1R4-S9, 15.1R6-S6, 15.1R7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1X65 ant\u00e9rieures \u00e0 16.1X65-D47",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1R4-S9, 15.1R6-S6, 15.1R7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1 ant\u00e9rieures \u00e0 14.1R10, 14.1R9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53 ant\u00e9rieures \u00e0 14.1X53-D47",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 ant\u00e9rieures \u00e0 16.2R1-S6, 16.2R2-S5, 16.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D233, 15.1X53-D471, 15.1X53-D472, 15.1X53-D58, 15.1X53-D66",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3 ant\u00e9rieures \u00e0 12.3R12-S7, 12.3R13",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "CTPView versions ant\u00e9rieures \u00e0 7.3R4 ou 7.4R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D471 on NFX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 ant\u00e9rieures \u00e0 16.1R5-S3, 16.1R7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46 ant\u00e9rieures \u00e0 12.1X46-D76",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D66 sur QFX10K",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Snapshot Administrator (JSNAPy) versions ant\u00e9rieures \u00e0 1.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2 ant\u00e9rieures \u00e0 17.2R1-S5, 17.2R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "NorthStar Controller versions 3.2.x ant\u00e9rieures \u00e0 3.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1F2-S20, 15.1F6-S10, 15.1R7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46 ant\u00e9rieures \u00e0 12.1X46-D60 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 ant\u00e9rieures \u00e0 15.1X49-D131, 15.1X49-D140",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1F5-S3, 15.1F6-S8, 15.1F7, 15.1R5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "NorthStar Controller versions 3.0.x ant\u00e9rieures \u00e0 3.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48 ant\u00e9rieures \u00e0 12.3X48-D55",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 ant\u00e9rieures \u00e0 17.1R1-S7, 17.1R2-S6, 17.1R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 ant\u00e9rieures \u00e0 15.1X49-D130",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D66 sur QFX10",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Steel-Belted Radius (SBR) Carrier versions 8.4.1.x ant\u00e9rieures \u00e0 8.4.1-R5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53 ant\u00e9rieures \u00e0 14.1X53-D130",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 ant\u00e9rieures \u00e0 16.1R3-S8, 16.1R4-S8, 16.1R5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2 ant\u00e9rieures \u00e0 17.2R1-S3, 17.2R2-S1, 17.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-8767",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8767"
},
{
"name": "CVE-2018-0020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0020"
},
{
"name": "CVE-2016-5829",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5829"
},
{
"name": "CVE-2016-0701",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0701"
},
{
"name": "CVE-2015-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8324"
},
{
"name": "CVE-2018-0017",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0017"
},
{
"name": "CVE-2013-4312",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4312"
},
{
"name": "CVE-2018-0021",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0021"
},
{
"name": "CVE-2015-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5156"
},
{
"name": "CVE-2013-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1762"
},
{
"name": "CVE-2016-4470",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4470"
},
{
"name": "CVE-2017-1000385",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000385"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2018-0016",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0016"
},
{
"name": "CVE-2016-1583",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1583"
},
{
"name": "CVE-2014-7842",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7842"
},
{
"name": "CVE-2015-3644",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3644"
},
{
"name": "CVE-2016-2550",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2550"
},
{
"name": "CVE-2016-5696",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5696"
},
{
"name": "CVE-2015-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2925"
},
{
"name": "CVE-2018-0019",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0019"
},
{
"name": "CVE-2016-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4565"
},
{
"name": "CVE-2018-0022",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0022"
},
{
"name": "CVE-2014-0016",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0016"
},
{
"name": "CVE-2016-0774",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0774"
},
{
"name": "CVE-2015-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7550"
},
{
"name": "CVE-2014-8134",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8134"
},
{
"name": "CVE-2015-8104",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8104"
},
{
"name": "CVE-2017-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3732"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2015-2080",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2080"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2015-8543",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8543"
},
{
"name": "CVE-2015-3193",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3193"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2015-7613",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7613"
},
{
"name": "CVE-2015-5157",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5157"
},
{
"name": "CVE-2008-2420",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2420"
},
{
"name": "CVE-2008-2400",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2400"
},
{
"name": "CVE-2018-0018",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0018"
},
{
"name": "CVE-2015-1805",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1805"
},
{
"name": "CVE-2018-0023",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0023"
},
{
"name": "CVE-2010-5313",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-5313"
},
{
"name": "CVE-2015-7872",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7872"
},
{
"name": "CVE-2015-5307",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5307"
},
{
"name": "CVE-2016-2143",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2143"
}
],
"initial_release_date": "2018-04-16T00:00:00",
"last_revision_date": "2018-04-16T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-184",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-04-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10852 du 11 avril 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10852\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10847 du 11 avril 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10847\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10845 du 11 avril 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10845\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10850 du 11 avril 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10850\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10855 du 11 avril 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10855\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10844 du 11 avril 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10844\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10846 du 11 avril 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10846\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10851 du 11 avril 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10851\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10856 du 11 avril 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10856\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10849 du 11 avril 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10849\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10853 du 11 avril 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10853\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10854 du 11 avril 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10854\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10848 du 11 avril 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10848\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2015-AVI-021
Vulnerability from certfr_avis - Published: 2015-01-14 - Updated: 2015-01-14
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service, un contournement de la politique de sécurité et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 12.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 10.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-9090",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9090"
},
{
"name": "CVE-2014-7842",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7842"
},
{
"name": "CVE-2014-7841",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7841"
},
{
"name": "CVE-2014-7843",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7843"
},
{
"name": "CVE-2014-8369",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8369"
},
{
"name": "CVE-2014-8134",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8134"
},
{
"name": "CVE-2014-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3611"
},
{
"name": "CVE-2014-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3610"
},
{
"name": "CVE-2014-8884",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8884"
},
{
"name": "CVE-2014-9322",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9322"
}
],
"initial_release_date": "2015-01-14T00:00:00",
"last_revision_date": "2015-01-14T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-021",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-01-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le noyau \u003cspan\nclass=\"textit\"\u003eLinux\u003c/span\u003e d\u0027\u003cspan class=\"textit\"\u003eUbuntu\u003c/span\u003e. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service, un\ncontournement de la politique de s\u00e9curit\u00e9 et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2464-1 du 13 janvier 2015",
"url": "http://www.ubuntu.com/usn/usn-2464-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2463-1 du 13 janvier 2015",
"url": "http://www.ubuntu.com/usn/usn-2463-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2468-1 du 13 janvier 2015",
"url": "http://www.ubuntu.com/usn/usn-2468-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2466-1 du 13 janvier 2015",
"url": "http://www.ubuntu.com/usn/usn-2466-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2465-1 du 13 janvier 2015",
"url": "http://www.ubuntu.com/usn/usn-2465-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2462-1 du 13 janvier 2015",
"url": "http://www.ubuntu.com/usn/usn-2462-1/"
}
]
}
FKIE_CVE-2014-7842
Vulnerability from fkie_nvd - Published: 2014-11-30 01:59 - Updated: 2025-04-12 10:46| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2b9e6c1a35afcc0973acb72e591c714e78885ff | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html | ||
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-0855.html | ||
| secalert@redhat.com | http://secunia.com/advisories/62305 | ||
| secalert@redhat.com | http://secunia.com/advisories/62326 | ||
| secalert@redhat.com | http://secunia.com/advisories/62336 | ||
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2014/11/13/7 | ||
| secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | ||
| secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html | ||
| secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/71078 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1163762 | Vendor Advisory | |
| secalert@redhat.com | https://github.com/torvalds/linux/commit/a2b9e6c1a35afcc0973acb72e591c714e78885ff | Vendor Advisory | |
| secalert@redhat.com | https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2b9e6c1a35afcc0973acb72e591c714e78885ff | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-0855.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/62305 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/62326 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/62336 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2014/11/13/7 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/71078 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1163762 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/a2b9e6c1a35afcc0973acb72e591c714e78885ff | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4 | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | 3.0 | |
| linux | linux_kernel | 3.0 | |
| linux | linux_kernel | 3.0 | |
| linux | linux_kernel | 3.0 | |
| linux | linux_kernel | 3.0 | |
| linux | linux_kernel | 3.0 | |
| linux | linux_kernel | 3.0 | |
| linux | linux_kernel | 3.0.1 | |
| linux | linux_kernel | 3.0.2 | |
| linux | linux_kernel | 3.0.3 | |
| linux | linux_kernel | 3.0.4 | |
| linux | linux_kernel | 3.0.5 | |
| linux | linux_kernel | 3.0.6 | |
| linux | linux_kernel | 3.0.7 | |
| linux | linux_kernel | 3.0.8 | |
| linux | linux_kernel | 3.0.9 | |
| linux | linux_kernel | 3.0.10 | |
| linux | linux_kernel | 3.0.11 | |
| linux | linux_kernel | 3.0.12 | |
| linux | linux_kernel | 3.0.13 | |
| linux | linux_kernel | 3.0.14 | |
| linux | linux_kernel | 3.0.15 | |
| linux | linux_kernel | 3.0.16 | |
| linux | linux_kernel | 3.0.17 | |
| linux | linux_kernel | 3.0.18 | |
| linux | linux_kernel | 3.0.19 | |
| linux | linux_kernel | 3.0.20 | |
| linux | linux_kernel | 3.0.21 | |
| linux | linux_kernel | 3.0.22 | |
| linux | linux_kernel | 3.0.23 | |
| linux | linux_kernel | 3.0.24 | |
| linux | linux_kernel | 3.0.25 | |
| linux | linux_kernel | 3.0.26 | |
| linux | linux_kernel | 3.0.27 | |
| linux | linux_kernel | 3.0.28 | |
| linux | linux_kernel | 3.0.29 | |
| linux | linux_kernel | 3.0.30 | |
| linux | linux_kernel | 3.0.31 | |
| linux | linux_kernel | 3.0.32 | |
| linux | linux_kernel | 3.0.33 | |
| linux | linux_kernel | 3.0.34 | |
| linux | linux_kernel | 3.0.35 | |
| linux | linux_kernel | 3.0.36 | |
| linux | linux_kernel | 3.0.37 | |
| linux | linux_kernel | 3.0.38 | |
| linux | linux_kernel | 3.0.39 | |
| linux | linux_kernel | 3.0.40 | |
| linux | linux_kernel | 3.0.41 | |
| linux | linux_kernel | 3.0.42 | |
| linux | linux_kernel | 3.0.43 | |
| linux | linux_kernel | 3.0.44 | |
| linux | linux_kernel | 3.0.45 | |
| linux | linux_kernel | 3.0.46 | |
| linux | linux_kernel | 3.0.47 | |
| linux | linux_kernel | 3.0.48 | |
| linux | linux_kernel | 3.0.49 | |
| linux | linux_kernel | 3.0.50 | |
| linux | linux_kernel | 3.0.51 | |
| linux | linux_kernel | 3.0.52 | |
| linux | linux_kernel | 3.0.53 | |
| linux | linux_kernel | 3.0.54 | |
| linux | linux_kernel | 3.0.55 | |
| linux | linux_kernel | 3.0.56 | |
| linux | linux_kernel | 3.0.57 | |
| linux | linux_kernel | 3.0.58 | |
| linux | linux_kernel | 3.0.59 | |
| linux | linux_kernel | 3.0.60 | |
| linux | linux_kernel | 3.0.61 | |
| linux | linux_kernel | 3.0.62 | |
| linux | linux_kernel | 3.0.63 | |
| linux | linux_kernel | 3.0.64 | |
| linux | linux_kernel | 3.0.65 | |
| linux | linux_kernel | 3.0.66 | |
| linux | linux_kernel | 3.0.67 | |
| linux | linux_kernel | 3.0.68 | |
| linux | linux_kernel | 3.1 | |
| linux | linux_kernel | 3.1 | |
| linux | linux_kernel | 3.1 | |
| linux | linux_kernel | 3.1 | |
| linux | linux_kernel | 3.1 | |
| linux | linux_kernel | 3.1.1 | |
| linux | linux_kernel | 3.1.2 | |
| linux | linux_kernel | 3.1.3 | |
| linux | linux_kernel | 3.1.4 | |
| linux | linux_kernel | 3.1.5 | |
| linux | linux_kernel | 3.1.6 | |
| linux | linux_kernel | 3.1.7 | |
| linux | linux_kernel | 3.1.8 | |
| linux | linux_kernel | 3.1.9 | |
| linux | linux_kernel | 3.1.10 | |
| linux | linux_kernel | 3.2 | |
| linux | linux_kernel | 3.2 | |
| linux | linux_kernel | 3.2 | |
| linux | linux_kernel | 3.2 | |
| linux | linux_kernel | 3.10 | |
| linux | linux_kernel | 3.10.0 | |
| linux | linux_kernel | 3.10.1 | |
| linux | linux_kernel | 3.10.1 | |
| linux | linux_kernel | 3.10.2 | |
| linux | linux_kernel | 3.10.2 | |
| linux | linux_kernel | 3.10.3 | |
| linux | linux_kernel | 3.10.3 | |
| linux | linux_kernel | 3.10.4 | |
| linux | linux_kernel | 3.10.4 | |
| linux | linux_kernel | 3.10.5 | |
| linux | linux_kernel | 3.10.5 | |
| linux | linux_kernel | 3.10.6 | |
| linux | linux_kernel | 3.10.6 | |
| linux | linux_kernel | 3.10.7 | |
| linux | linux_kernel | 3.10.7 | |
| linux | linux_kernel | 3.10.8 | |
| linux | linux_kernel | 3.10.8 | |
| linux | linux_kernel | 3.10.9 | |
| linux | linux_kernel | 3.10.9 | |
| linux | linux_kernel | 3.10.10 | |
| linux | linux_kernel | 3.10.11 | |
| linux | linux_kernel | 3.10.12 | |
| linux | linux_kernel | 3.10.13 | |
| linux | linux_kernel | 3.10.14 | |
| linux | linux_kernel | 3.10.15 | |
| linux | linux_kernel | 3.10.16 | |
| linux | linux_kernel | 3.10.17 | |
| linux | linux_kernel | 3.10.18 | |
| linux | linux_kernel | 3.10.19 | |
| linux | linux_kernel | 3.10.20 | |
| linux | linux_kernel | 3.10.21 | |
| linux | linux_kernel | 3.10.22 | |
| linux | linux_kernel | 3.10.23 | |
| linux | linux_kernel | 3.10.24 | |
| linux | linux_kernel | 3.10.25 | |
| linux | linux_kernel | 3.10.26 | |
| linux | linux_kernel | 3.10.27 | |
| linux | linux_kernel | 3.10.28 | |
| linux | linux_kernel | 3.10.29 | |
| linux | linux_kernel | 3.11 | |
| linux | linux_kernel | 3.11.1 | |
| linux | linux_kernel | 3.11.2 | |
| linux | linux_kernel | 3.11.3 | |
| linux | linux_kernel | 3.11.4 | |
| linux | linux_kernel | 3.11.5 | |
| linux | linux_kernel | 3.11.6 | |
| linux | linux_kernel | 3.11.7 | |
| linux | linux_kernel | 3.11.8 | |
| linux | linux_kernel | 3.11.9 | |
| linux | linux_kernel | 3.11.10 | |
| linux | linux_kernel | 3.12 | |
| linux | linux_kernel | 3.12.1 | |
| linux | linux_kernel | 3.12.2 | |
| linux | linux_kernel | 3.12.3 | |
| linux | linux_kernel | 3.12.4 | |
| linux | linux_kernel | 3.12.5 | |
| linux | linux_kernel | 3.12.6 | |
| linux | linux_kernel | 3.12.7 | |
| linux | linux_kernel | 3.12.8 | |
| linux | linux_kernel | 3.12.9 | |
| linux | linux_kernel | 3.12.10 | |
| linux | linux_kernel | 3.12.11 | |
| linux | linux_kernel | 3.12.12 | |
| linux | linux_kernel | 3.12.13 | |
| linux | linux_kernel | 3.12.14 | |
| linux | linux_kernel | 3.12.15 | |
| linux | linux_kernel | 3.12.16 | |
| linux | linux_kernel | 3.12.17 | |
| linux | linux_kernel | 3.13 | |
| linux | linux_kernel | 3.13.1 | |
| linux | linux_kernel | 3.13.2 | |
| linux | linux_kernel | 3.13.3 | |
| linux | linux_kernel | 3.13.4 | |
| linux | linux_kernel | 3.13.5 | |
| linux | linux_kernel | 3.13.6 | |
| linux | linux_kernel | 3.13.7 | |
| linux | linux_kernel | 3.13.8 | |
| linux | linux_kernel | 3.13.9 | |
| linux | linux_kernel | 3.13.10 | |
| linux | linux_kernel | 3.13.11 | |
| linux | linux_kernel | 3.14 | |
| linux | linux_kernel | 3.14 | |
| linux | linux_kernel | 3.14 | |
| linux | linux_kernel | 3.14 | |
| linux | linux_kernel | 3.14 | |
| linux | linux_kernel | 3.14 | |
| linux | linux_kernel | 3.14 | |
| linux | linux_kernel | 3.14 | |
| linux | linux_kernel | 3.14 | |
| linux | linux_kernel | 3.14.1 | |
| linux | linux_kernel | 3.14.2 | |
| linux | linux_kernel | 3.14.3 | |
| linux | linux_kernel | 3.14.4 | |
| linux | linux_kernel | 3.14.5 | |
| linux | linux_kernel | 3.15 | |
| linux | linux_kernel | 3.15.1 | |
| linux | linux_kernel | 3.15.2 | |
| linux | linux_kernel | 3.15.3 | |
| linux | linux_kernel | 3.15.4 | |
| linux | linux_kernel | 3.15.5 | |
| linux | linux_kernel | 3.15.6 | |
| linux | linux_kernel | 3.15.7 | |
| linux | linux_kernel | 3.15.8 | |
| linux | linux_kernel | 3.16.0 | |
| linux | linux_kernel | 3.16.1 | |
| linux | linux_kernel | 3.17 | |
| linux | linux_kernel | 3.17.1 | |
| linux | linux_kernel | 3.17.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10CD8F3F-FD9D-4B87-A40A-C2F29ACEEF47",
"versionEndIncluding": "3.17.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D30AEC07-3CBD-4F4F-9646-BEAA1D98750B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C2AA8E68-691B-499C-AEDD-3C0BFFE70044",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "9440475B-5960-4066-A204-F30AAFC87846",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "53BCFBFB-6AF0-4525-8623-7633CC5E17DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*",
"matchCriteriaId": "6ED4E86A-74F0-436A-BEB4-3F4EE93A5421",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*",
"matchCriteriaId": "BF0365B0-8E16-4F30-BD92-5DD538CC8135",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*",
"matchCriteriaId": "079505E8-2942-4C33-93D1-35ADA4C39E72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38989541-2360-4E0A-AE5A-3D6144AA6114",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4E51646B-7A0E-40F3-B8C9-239C1DA81DD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "42A8A507-F8E2-491C-A144-B2448A1DB26E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "901FC6F3-2C2A-4112-AE27-AB102BBE8DEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "203AD334-DB9F-41B0-A4D1-A6C158EF8C40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B3611753-E440-410F-8250-600C996A4B8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9739BB47-EEAF-42F1-A557-2AE2EA9526A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "5A95E3BB-0AFC-4C2E-B9BE-C975E902A266",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "482A6C9A-9B8E-4D1C-917A-F16370745E7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D87357-63E0-41D0-9F02-1BCBF9A77E63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "3765A2D6-2D78-4FB1-989E-D5106BFA3F5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F54257DB-7023-43C4-AC4D-9590B815CD92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "61FF5FCD-A4A1-4803-AC53-320A4C838AF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "9F096553-064F-46A2-877B-F32F163A0F49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "C0D762D1-E3AD-40EA-8D39-83EEB51B5E85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "A6187D19-7148-4B87-AD7E-244FF9EE0FA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "99AC64C2-E391-485C-9CD7-BA09C8FA5E63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "8CDA5E95-7805-441B-BEF7-4448EA45E964",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "51561053-6C28-4F38-BC9B-3F7A7508EB72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "118F4A5B-C498-4FC3-BE28-50D18EBE4F22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "BD38EBE6-FE1A-4B55-9FB5-07952253B7A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "3A491E47-82AD-4055-9444-2EC0D6715326",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*",
"matchCriteriaId": "13C5FD16-23B6-467F-9438-5B554922F974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "9C67235F-5B51-4BF7-89EC-4810F720246F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*",
"matchCriteriaId": "08405DEF-05F4-45F0-AC95-DBF914A36D93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7B9C4B-4A41-4175-9F07-191C1EE98C1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*",
"matchCriteriaId": "B306E0A8-4D4A-4895-8128-A500D30A7E0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*",
"matchCriteriaId": "295C839A-F34E-4853-A926-55EABC639412",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*",
"matchCriteriaId": "2AFD5F49-7EF9-4CFE-95BD-8FD19B500B0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "00B3DDDD-B2F6-4753-BA38-65A24017857D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*",
"matchCriteriaId": "33FCD39E-F4BF-432D-9CF9-F195CF5844F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*",
"matchCriteriaId": "C7308690-CB0D-4758-B80F-D2ADCD2A9D66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*",
"matchCriteriaId": "313A470B-8A2B-478A-82B5-B27D2718331C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*",
"matchCriteriaId": "83FF021E-07E3-41CC-AAE8-D99D7FF24B9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*",
"matchCriteriaId": "F72412E3-8DA9-4CC9-A426-B534202ADBA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*",
"matchCriteriaId": "FCAA9D7A-3C3E-4C0B-9D38-EA80E68C2E46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*",
"matchCriteriaId": "4A9E3AE5-3FCF-4CBB-A30B-082BCFBFB0CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*",
"matchCriteriaId": "CF715657-4C3A-4392-B85D-1BBF4DE45D89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*",
"matchCriteriaId": "4B63C618-AC3D-4EF7-AFDF-27B9BF482B78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*",
"matchCriteriaId": "C33DA5A9-5E40-4365-9602-82FB4DCD15B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*",
"matchCriteriaId": "EFAFDB74-40BD-46FA-89AC-617EB2C7160B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*",
"matchCriteriaId": "CF5F17DA-30A7-40CF-BD7C-CEDF06D64617",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*",
"matchCriteriaId": "71A276F5-BD9D-4C1B-90DF-9B0C15B6F7DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*",
"matchCriteriaId": "F8F6EBEC-3C29-444B-BB85-6EF239B59EC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*",
"matchCriteriaId": "FDB91302-FD18-44CF-A8A8-B31483328539",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*",
"matchCriteriaId": "9B81DC2B-46FA-4640-AD6C-2A404D94BA0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6A1663-BC4C-4FC9-B5EB-A52EDED17B26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*",
"matchCriteriaId": "69C33D6C-6B9F-49F4-B505-E7B589CDEC50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*",
"matchCriteriaId": "C464796B-2F31-4159-A132-82A0C74137B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*",
"matchCriteriaId": "1D6C6E46-FE29-4D2D-A0EC-43DA5112BCC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*",
"matchCriteriaId": "1A370E91-73A1-4D62-8E7B-696B920203F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*",
"matchCriteriaId": "340197CD-9645-4B7E-B976-F3F5A7D4C5BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*",
"matchCriteriaId": "96030636-0C4A-4A10-B768-525D6A0E18CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*",
"matchCriteriaId": "A42D8419-914F-4AD6-B0E9-C1290D514FF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E2C88B-42EA-4F4F-B1F6-A9332EC6888B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*",
"matchCriteriaId": "2449D13B-3314-4182-832F-03F6B11AA31F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*",
"matchCriteriaId": "9A35B66C-F050-4462-A58E-FEE061B5582E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*",
"matchCriteriaId": "1B551164-0167-49BB-A3AE-4034BDA3DCB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*",
"matchCriteriaId": "7244278E-49B6-4405-A14C-F3540C8F5AF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*",
"matchCriteriaId": "B4C3E4B8-7274-4ABB-B7CE-6A39C183CE18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*",
"matchCriteriaId": "6501EDB9-4847-47F8-90EE-B295626E4CDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*",
"matchCriteriaId": "2D676D48-7521-45E2-8563-6B966FF86A35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*",
"matchCriteriaId": "3B69FA17-0AB9-4986-A5A7-2A4C1DD24222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*",
"matchCriteriaId": "7BC35593-96C7-41F0-B738-1568F8129121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*",
"matchCriteriaId": "38D23794-0E7C-4FA5-A7A8-CF940E3FA962",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*",
"matchCriteriaId": "008E1E7D-4C20-4560-9288-EF532ADB0029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*",
"matchCriteriaId": "3B3A7044-A92E-47A9-A7BD-35E5B575F5FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*",
"matchCriteriaId": "783E2980-B6AB-489E-B157-B6A2E10A32CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3DFFE5A6-6A67-4992-84A3-C0F05FACDEAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "13BBD2A3-AE10-48B9-8776-4FB1CAC37D44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "B25680CC-8918-4F27-8D7E-A6579215450B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*",
"matchCriteriaId": "92C48B4C-410C-4BA8-A28A-B2E928320FCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*",
"matchCriteriaId": "CB447523-855B-461E-8197-95169BE86EB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B155BBDF-6DF6-4FF5-9C41-D8A5266DCC67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "28476DEC-9630-4B40-9D4D-9BC151DC4CA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5646880A-2355-4BDD-89E7-825863A0311F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7FF99148-267A-46F8-9927-A9082269BAF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A783C083-5D9C-48F9-B5A6-A97A9604FB19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2B817A24-03AC-46CD-BEFA-505457FD2A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "51CF1BCE-090E-4B70-BA16-ACB74411293B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "187AAD67-10D7-4B57-B4C6-00443E246AF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F341CE88-C5BC-4CDD-9CB5-B6BAD7152E63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "37ACE2A6-C229-4236-8E9F-235F008F3AA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D3220B70-917F-4F9F-8A3B-2BF581281E8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:x86:*",
"matchCriteriaId": "7D47A395-821D-4BFF-996E-E849D9A40217",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "99372D07-C06A-41FA-9843-6D57F99AB5AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "2B9DC110-D260-4DB4-B8B0-EF1D160ADA07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1C37F47C-C217-4BCF-A758-14E1BDBAD63D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.0:*:*:*:*:*:arm64:*",
"matchCriteriaId": "C8409226-20A1-4549-9E11-6D0C3C38DCCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D0D32776-8ADB-4E79-846A-C0C99FED19E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:arm64:*",
"matchCriteriaId": "77482843-364E-471F-A909-F373376FAEF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B7D01673-D13F-487F-81B6-1279C187277E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:arm64:*",
"matchCriteriaId": "7E0221EF-13B8-42A2-8CEB-B95BDA2A2F5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "ADB27A3E-78E4-40F7-9716-A1099B0D85FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:arm64:*",
"matchCriteriaId": "4F8A1100-F68D-4352-AB8D-B40AD97AE0EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "16E7136A-A8A6-4BF5-AF5D-AFB5C7A10712",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:arm64:*",
"matchCriteriaId": "991EF15A-B6DD-4D7F-87B5-144ED86642DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE127AC-E61D-427A-B998-D60DF5AABA21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:arm64:*",
"matchCriteriaId": "DDA334EC-14D7-4220-ABBE-6D091A4EE374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3819FF99-AEC5-4466-8542-D395419E4308",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:arm64:*",
"matchCriteriaId": "A76A48F9-591E-4884-B758-A8E438ECC9C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E621FA1A-464B-4D2A-A0D6-EDA475A3709B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:arm64:*",
"matchCriteriaId": "7C056E51-93C5-4E53-92FB-DB1805A14879",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B760B422-EA11-43AB-B6D2-CA54E7229663",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:arm64:*",
"matchCriteriaId": "09F8266B-B3EC-44EB-AE10-CA06ECBCC4A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*",
"matchCriteriaId": "D2CA7BBC-917C-4F31-A442-465C30444836",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:arm64:*",
"matchCriteriaId": "74B5D711-9E95-4F4D-A7A5-EC4C34B436BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*",
"matchCriteriaId": "AE778000-4FD5-4032-86CE-5930EF4CB7C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*",
"matchCriteriaId": "B3344EEB-F037-48FE-81DC-67F6384F7D9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0244B0CA-9C67-4F06-BFBA-1F257112AC08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2148C13F-4BB0-4D46-A688-F7C726D12497",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.14:*:*:*:*:*:*:*",
"matchCriteriaId": "9871AF57-9158-4A41-8340-596B4463289A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.15:*:*:*:*:*:*:*",
"matchCriteriaId": "2A875207-DF01-4240-8895-49B62693D27B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.16:*:*:*:*:*:*:*",
"matchCriteriaId": "FE04A172-6F3B-4E3B-8D4D-564740FABAAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.17:*:*:*:*:*:*:*",
"matchCriteriaId": "CFEEF8C4-7DC2-4230-B58C-337F39A4DFAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.18:*:*:*:*:*:*:*",
"matchCriteriaId": "9F74DB5C-5096-438C-8C8A-6D337A2FD06A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.19:*:*:*:*:*:*:*",
"matchCriteriaId": "9DFF4564-6550-4839-B12A-EA379DDFE4F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.20:*:*:*:*:*:*:*",
"matchCriteriaId": "10184594-C707-4A2F-AE28-430EC3102AA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.21:*:*:*:*:*:*:*",
"matchCriteriaId": "9AD06026-B85F-412A-A44B-DAEF8D538327",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.22:*:*:*:*:*:*:*",
"matchCriteriaId": "DCA2929F-EDF9-433B-9CD7-3EE9D2C5EDD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.23:*:*:*:*:*:*:*",
"matchCriteriaId": "80527FA6-39CD-4A85-BD3A-214AC617B995",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.24:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCA90D7-AF62-4576-9139-107842834066",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.25:*:*:*:*:*:*:*",
"matchCriteriaId": "9B61F12C-8F6E-4BDD-8793-76E3BCAB73CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.26:*:*:*:*:*:*:*",
"matchCriteriaId": "A569A978-0CF1-46BC-A174-7F7F2ADCE8A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.27:*:*:*:*:*:*:*",
"matchCriteriaId": "E2D473E1-3F56-4415-9ACB-4F4CA9707E78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.28:*:*:*:*:*:*:*",
"matchCriteriaId": "FF938D94-226A-4375-8DEF-B4019AE5AFC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10.29:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF4FFA5-BF94-4C87-ADB7-984111D98833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "639E3A57-A9E7-40E6-8929-81CCC0060EFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "07012ADD-F521-40A8-B067-E87C2238A3D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3F5FF393-3F89-4274-B82B-F671358072ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E348698F-54D1-4F5E-B701-CFAF50881E0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "932205D9-3514-4289-9B55-C7A169276930",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.11.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2ECB2D33-F517-480F-8A6F-99D9D6C49596",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.11.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D16F68DD-E2D4-4AA4-AB81-3796C2947E37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.11.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2422AC23-8410-4524-A733-25E4ABC7515D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.11.8:*:*:*:*:*:*:*",
"matchCriteriaId": "E1BEBC08-884B-4F58-B3C6-B26F1D5BE474",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.11.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B26B7E40-0EEB-44DF-BE2E-917947D41217",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.11.10:*:*:*:*:*:*:*",
"matchCriteriaId": "EF5C073C-D0BF-4691-94C4-6E4582032F1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "B291154A-4B91-4A0E-AAAE-716A8BB7BF99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D835FBA1-49DE-4184-BEC8-7ED2B3F7B0BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "080BD3C9-0606-4D9A-B7AE-3DF9F75B8FF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CCDF0F11-3DB4-41F6-B6D3-383857884258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB1772A-F4AA-4AB8-9FC9-10993A6A5B46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB5B4D7-C79C-448E-B0D4-A6A9C440F49C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7C9A32A2-C1EC-4463-B21F-79E6592C5339",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DD8683B9-63EF-43D0-8E4F-2909429B47E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.8:*:*:*:*:*:*:*",
"matchCriteriaId": "91F6A187-E8B1-47CF-B375-FB453F8000F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4332E-E1D4-4B6E-B9FE-B33CCF083402",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1949D7D6-7DD2-458B-89D3-B0090C8E9984",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.11:*:*:*:*:*:*:*",
"matchCriteriaId": "BA23201B-8DC1-4694-8DD9-661BC78F152A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.12:*:*:*:*:*:*:*",
"matchCriteriaId": "FDDB83D1-8A25-495E-BC27-0E2059255DEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.13:*:*:*:*:*:*:*",
"matchCriteriaId": "5BF8D075-08F5-4CF4-8416-9963CA6B04D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.14:*:*:*:*:*:*:*",
"matchCriteriaId": "1E4ED579-E7D9-434A-A357-3D9056784227",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.15:*:*:*:*:*:*:*",
"matchCriteriaId": "79E9D537-1F1A-462B-A6D6-2DC4FF07A843",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.16:*:*:*:*:*:*:*",
"matchCriteriaId": "1B2AEF20-1F50-497D-AD1E-AC0ED7699DDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.17:*:*:*:*:*:*:*",
"matchCriteriaId": "93A7B9D2-EF81-4952-AD6F-C5870331F17E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "50513044-C297-4D5E-BD45-6FD603A29F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "531009EC-C86D-4017-BEF1-924674268F6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6FBC6289-598B-429E-94CE-5D98B120B9AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.13.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4D5B7BFA-81AC-424C-A6BC-32CBBDCA6148",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.13.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0551AB9C-1D52-4A7B-99F8-357FB90067D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.13.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B043E843-877A-4966-9505-C57D69D54C18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.13.6:*:*:*:*:*:*:*",
"matchCriteriaId": "70EED6A5-49BB-4204-94B5-3A48CE61811B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.13.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CA4749C0-10E1-43A1-A2DE-D260B513AC02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.13.8:*:*:*:*:*:*:*",
"matchCriteriaId": "0026BE0A-C87B-4EDD-8AF5-67C05F2A465D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.13.9:*:*:*:*:*:*:*",
"matchCriteriaId": "E42C27D8-8ED6-4403-AAAA-8F6C06910FA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.13.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9A4A60F8-2F0B-4872-B3C5-45443EA71F8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.13.11:*:*:*:*:*:*:*",
"matchCriteriaId": "90A077DF-5648-45F7-A078-294E81834279",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.14:-:*:*:*:*:*:*",
"matchCriteriaId": "851B1505-0318-49F4-8D7C-196BE04FF173",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B1817B5C-356A-44FD-A645-AF224A59F6ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "3B528018-4A7E-4E59-A7CA-91D2A9536831",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "1795E18E-AE30-4230-809F-E40317FB96BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "0F91AF02-7C23-4888-A580-07C166BE8128",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "61A7DB5C-EB54-4D4A-AB38-8060F13C8779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.14:rc6:*:*:*:*:*:*",
"matchCriteriaId": "4FF2C86B-7087-4EFC-A256-3AF313C25325",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.14:rc7:*:*:*:*:*:*",
"matchCriteriaId": "14AC6A73-D01C-44F4-9821-BAE9600E72D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.14:rc8:*:*:*:*:*:*",
"matchCriteriaId": "055557BE-1FE9-45F5-8A95-F8D3C9B031E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "742641DA-1CAE-4156-95F3-367793713696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.14.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A3EBDD96-92E4-429F-A697-14364CF68EEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.14.3:*:*:*:*:*:*:*",
"matchCriteriaId": "998AC0EF-FC56-4F8F-B9B2-1A45C80C2231",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.14.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DF6C7930-913B-4B82-BF14-CD9A0E8A968F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.14.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8C905078-11F7-40BA-8B6B-3B4CE694C13F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "F5827B65-9941-4927-8D47-57229EEA290F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A2BF2195-6A13-432D-8449-A199AC0F1F64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B27819-66BF-456D-BFB6-968DC0C1E30F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.15.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DEE5C195-666A-439F-983B-6400D83ABF38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.15.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE03C46-54BC-4B09-AC45-49E1A0381B52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.15.5:*:*:*:*:*:*:*",
"matchCriteriaId": "38104782-E753-42E7-8165-19E55001385D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.15.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F111DBEB-C381-4F58-BE41-4C4ADA7CE408",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.15.7:*:*:*:*:*:*:*",
"matchCriteriaId": "ADBE48D8-0DDE-44B6-B77F-D4A3ACBEF3CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.15.8:*:*:*:*:*:*:*",
"matchCriteriaId": "19651F00-02E0-4402-A2A1-707524295B4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3CFFCDFC-AE4F-47EE-B1DA-05A6865D1745",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3C610146-2E9B-43D3-A78F-26EDE1E918A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "6074A968-0943-4F9C-BCB4-E35D6CC70CED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F7FE4F6D-6B48-4D7F-AE9F-2CC0979FB2F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "43F7E84B-5138-4AA2-A78D-DCF624966ABC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313."
},
{
"lang": "es",
"value": "Condici\u00f3n de carrera en arch/x86/kvm/x86.c en el kernel de Linux anterior a 3.17.4 permite a usuarios del sistema operativo invitado causar una denegaci\u00f3n de servicio (ca\u00edda del sistema operativo invitado) a trav\u00e9s de una aplicaci\u00f3n manipulada que realiza una transacci\u00f3n MMIO o una transacci\u00f3n PIO para provocar un informe de error de emulaci\u00f3n en el espacio del usuario invitado, un problema similar a CVE-2010-5313."
}
],
"id": "CVE-2014-7842",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-11-30T01:59:04.587",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2b9e6c1a35afcc0973acb72e591c714e78885ff"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0855.html"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/62305"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/62326"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/62336"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2014/11/13/7"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/71078"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163762"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/torvalds/linux/commit/a2b9e6c1a35afcc0973acb72e591c714e78885ff"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2b9e6c1a35afcc0973acb72e591c714e78885ff"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0855.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62305"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62326"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62336"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2014/11/13/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/71078"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163762"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/torvalds/linux/commit/a2b9e6c1a35afcc0973acb72e591c714e78885ff"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2014-7842
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2014-7842",
"description": "Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313.",
"id": "GSD-2014-7842",
"references": [
"https://www.suse.com/security/cve/CVE-2014-7842.html",
"https://access.redhat.com/errata/RHSA-2016:0855",
"https://access.redhat.com/errata/RHSA-2015:2152",
"https://ubuntu.com/security/CVE-2014-7842",
"https://linux.oracle.com/cve/CVE-2014-7842.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2014-7842"
],
"details": "Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313.",
"id": "GSD-2014-7842",
"modified": "2023-12-13T01:22:47.175241Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-7842",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource": "MISC",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource": "MISC",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2016-0855.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0855.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource": "MISC",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name": "http://secunia.com/advisories/62305",
"refsource": "MISC",
"url": "http://secunia.com/advisories/62305"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2b9e6c1a35afcc0973acb72e591c714e78885ff",
"refsource": "MISC",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2b9e6c1a35afcc0973acb72e591c714e78885ff"
},
{
"name": "http://secunia.com/advisories/62326",
"refsource": "MISC",
"url": "http://secunia.com/advisories/62326"
},
{
"name": "http://secunia.com/advisories/62336",
"refsource": "MISC",
"url": "http://secunia.com/advisories/62336"
},
{
"name": "http://www.openwall.com/lists/oss-security/2014/11/13/7",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2014/11/13/7"
},
{
"name": "http://www.securityfocus.com/bid/71078",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/71078"
},
{
"name": "https://github.com/torvalds/linux/commit/a2b9e6c1a35afcc0973acb72e591c714e78885ff",
"refsource": "MISC",
"url": "https://github.com/torvalds/linux/commit/a2b9e6c1a35afcc0973acb72e591c714e78885ff"
},
{
"name": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4",
"refsource": "MISC",
"url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1163762",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163762"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.15.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.15.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.14:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.13.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.13.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.13.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.15.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.14.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.11.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.15.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.14.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.17.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.12.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.14:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.15.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:arm64:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.11.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.13.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.13.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.14:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.11.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.12.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.17.3",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.11.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.14:rc8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:arm64:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.12.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.14:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:arm64:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.13.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.13.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.13.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.13.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.12.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.14.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.11.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.14:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.14:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.14.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.12.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:arm64:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:arm64:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.12.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.12.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.11.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.12.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.11.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:arm64:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:arm64:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.16.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:arm64:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.12.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.11.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.17.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.12.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.12.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:x86:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.12.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.0:*:*:*:*:*:arm64:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.12.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.12.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.12.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.15.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.11.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.15.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.12.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.14:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:arm64:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.15.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.13.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.12.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.14.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.14:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.11.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.10.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:3.13.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-7842"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4"
},
{
"name": "https://github.com/torvalds/linux/commit/a2b9e6c1a35afcc0973acb72e591c714e78885ff",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/torvalds/linux/commit/a2b9e6c1a35afcc0973acb72e591c714e78885ff"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1163762",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163762"
},
{
"name": "[oss-security] 20141113 CVE-2014-7842 Linux kernel: kvm: reporting emulation failures to userspace",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2014/11/13/7"
},
{
"name": "62326",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/62326"
},
{
"name": "62305",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/62305"
},
{
"name": "62336",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/62336"
},
{
"name": "SUSE-SU-2015:0481",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"
},
{
"name": "openSUSE-SU-2015:0566",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
},
{
"name": "SUSE-SU-2015:0652",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html"
},
{
"name": "SUSE-SU-2015:0736",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"name": "RHSA-2016:0855",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2016-0855.html"
},
{
"name": "71078",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/71078"
},
{
"name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2b9e6c1a35afcc0973acb72e591c714e78885ff",
"refsource": "MISC",
"tags": [],
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2b9e6c1a35afcc0973acb72e591c714e78885ff"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T00:42Z",
"publishedDate": "2014-11-30T01:59Z"
}
}
}
GHSA-5J6G-RHRC-X47F
Vulnerability from github – Published: 2022-05-17 03:11 – Updated: 2022-05-17 03:11Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313.
{
"affected": [],
"aliases": [
"CVE-2014-7842"
],
"database_specific": {
"cwe_ids": [
"CWE-362"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2014-11-30T01:59:00Z",
"severity": "MODERATE"
},
"details": "Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313.",
"id": "GHSA-5j6g-rhrc-x47f",
"modified": "2022-05-17T03:11:32Z",
"published": "2022-05-17T03:11:32Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7842"
},
{
"type": "WEB",
"url": "https://github.com/torvalds/linux/commit/a2b9e6c1a35afcc0973acb72e591c714e78885ff"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163762"
},
{
"type": "WEB",
"url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4"
},
{
"type": "WEB",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2b9e6c1a35afcc0973acb72e591c714e78885ff"
},
{
"type": "WEB",
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a2b9e6c1a35afcc0973acb72e591c714e78885ff"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0855.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/62305"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/62326"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/62336"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2014/11/13/7"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/71078"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.