CVE-2018-5390
Published on: 08/06/2018 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:24:45 PM UTC
Certain versions of Advanced Core Operating System from A10networks contain the following vulnerability:
Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
- CVE-2018-5390 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
- Affected Vendor/Software:
Linux - Linux Kernel version 4.9
CVSS3 Score: 7.5 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | NONE | HIGH |
CVSS2 Score: 7.8 - HIGH
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | NONE | COMPLETE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
[SECURITY] [DLA 1466-1] linux-4.9 security update | Third Party Advisory lists.debian.org text/html |
![]() |
kernel/git/davem/net.git - David Miller's networking tree | Patch Vendor Advisory git.kernel.org text/html |
![]() |
USN-3763-1: Linux kernel vulnerability | Ubuntu security notices | Third Party Advisory usn.ubuntu.com text/html |
![]() |
TCP/IP – CVE-2018-5390 (SEGMENTSMACK) – A10 Support | Mitigation Third Party Advisory www.a10networks.com text/html |
![]() |
Third Party Advisory www.arubanetworks.com text/plain |
![]() | |
Oracle Critical Patch Update Advisory - July 2020 | Third Party Advisory www.oracle.com text/html |
![]() |
Red Hat Customer Portal | Third Party Advisory access.redhat.com text/html |
![]() |
No Description Provided | Third Party Advisory support.f5.com text/html |
![]() |
Red Hat Customer Portal | Third Party Advisory access.redhat.com text/html |
![]() |
CVE-2018-5390 Linux Kernel Denial of Service (DoS) Vulnerability in NetApp Products | NetApp Product Security | Third Party Advisory security.netapp.com text/html |
![]() |
Red Hat Customer Portal | Third Party Advisory access.redhat.com text/html |
![]() |
USN-3742-1: Linux kernel vulnerabilities | Ubuntu security notices | Third Party Advisory usn.ubuntu.com text/html |
![]() |
Red Hat Customer Portal | Third Party Advisory access.redhat.com text/html |
![]() |
Synology Inc. | Third Party Advisory www.synology.com text/html |
![]() |
USN-3742-2: Linux kernel (Trusty HWE) vulnerabilities | Ubuntu security notices | Third Party Advisory usn.ubuntu.com text/html |
![]() |
Linux Kernel TCP Reassembly Algorithm Lets Remote Users Consume Excessive CPU Resources on the Target System - SecurityTracker | Third Party Advisory VDB Entry www.securitytracker.com text/html |
![]() |
DCIM Support | Third Party Advisory help.ecostruxureit.com text/html |
![]() |
Red Hat Customer Portal | Third Party Advisory access.redhat.com text/html |
![]() |
Debian -- Security Information -- DSA-4266-1 linux | Third Party Advisory www.debian.org Depreciated Link text/html |
![]() |
Red Hat Customer Portal | Third Party Advisory access.redhat.com text/html |
![]() |
USN-3741-2: Linux kernel (Xenial HWE) vulnerabilities | Ubuntu security notices | Third Party Advisory usn.ubuntu.com text/html |
![]() |
USN-3732-1: Linux kernel vulnerability | Ubuntu security notices | Third Party Advisory usn.ubuntu.com text/html |
![]() |
oss-security - Re: linux-distros membership application - Microsoft | Mailing List Third Party Advisory www.openwall.com text/html |
![]() |
Oracle Critical Patch Update - January 2019 | Patch Third Party Advisory www.oracle.com text/html |
![]() |
Third Party Advisory cert-portal.siemens.com application/pdf |
![]() | |
Red Hat Customer Portal | Third Party Advisory access.redhat.com text/html |
![]() |
VU#962459 - TCP implementations vulnerable to Denial of Service | Third Party Advisory US Government Resource www.kb.cert.org text/html |
![]() |
oss-security - Re: linux-distros membership application - Microsoft | Mailing List Third Party Advisory www.openwall.com text/html |
![]() |
Red Hat Customer Portal | Third Party Advisory access.redhat.com text/html |
![]() |
Linux Kernel 'tcp_input.c' Remote Denial of Service Vulnerability | Third Party Advisory VDB Entry cve.report (archive) text/html |
![]() |
USN-3732-2: Linux kernel (HWE) vulnerability | Ubuntu security notices | Third Party Advisory usn.ubuntu.com text/html |
![]() |
Security Advisory - SegmentSmack Vulnerability in Linux Kernel | Third Party Advisory www.huawei.com text/html |
![]() |
USN-3741-1: Linux kernel vulnerabilities | Ubuntu security notices | Third Party Advisory usn.ubuntu.com text/html |
![]() |
Red Hat Customer Portal | Third Party Advisory access.redhat.com text/html |
![]() |
Red Hat Customer Portal | Third Party Advisory access.redhat.com text/html |
![]() |
Juniper Junos TCP Reassembly Algorithm Lets Remote Users Consume Excessive CPU Resources on the Target System - SecurityTracker | Third Party Advisory VDB Entry www.securitytracker.com text/html |
![]() |
No Description Provided | Third Party Advisory support.f5.com text/html |
![]() |
Red Hat Customer Portal | Third Party Advisory access.redhat.com text/html |
![]() |
Linux and FreeBSD Kernels TCP Reassembly Denial of Service Vulnerabilities Affecting Cisco Products: August 2018 | Third Party Advisory tools.cisco.com text/html |
![]() |
oss-security - Re: linux-distros membership application - Microsoft | Mailing List Third Party Advisory www.openwall.com text/html |
![]() |
Red Hat Customer Portal | Third Party Advisory access.redhat.com text/html |
![]() |
Red Hat Customer Portal | Third Party Advisory access.redhat.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
- cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:*:*:*:*:*:*:*:
- cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:p5:*:*:*:*:*:*:
- cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:*:*:*:*:*:*:*:
- cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:p11:*:*:*:*:*:*:
- cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.1:p8:*:*:*:*:*:*:
- cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:*:*:*:*:*:*:*:
- cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:p4:*:*:*:*:*:*:
- cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:*:*:*:*:*:*:*:
- cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p1:*:*:*:*:*:*:
- cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:*:*:*:*:*:*:*:
- cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:p5:*:*:*:*:*:*:
- cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:*:*:*:*:*:*:*:
- cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:p11:*:*:*:*:*:*:
- cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.1:p8:*:*:*:*:*:*:
- cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:*:*:*:*:*:*:*:
- cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:p4:*:*:*:*:*:*:
- cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:*:*:*:*:*:*:*:
- cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p1:*:*:*:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*:
- cpe:2.3:a:cisco:collaboration_meeting_rooms:1.0:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:collaboration_meeting_rooms:1.0:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:digital_network_architecture_center:1.2:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:digital_network_architecture_center:1.2:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:expressway:x8.10:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:expressway:x8.10.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:expressway:x8.10.2:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:expressway:x8.10.3:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:expressway:x8.10.4:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:expressway:x8.11:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:expressway:x8.10:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:expressway:x8.10.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:expressway:x8.10.2:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:expressway:x8.10.3:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:expressway:x8.10.4:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:expressway:x8.11:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:expressway_series:-:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:expressway_series:-:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:meeting_management:1.0:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:meeting_management:1.0.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:meeting_management:1.0:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:meeting_management:1.0.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:network_assurance_engine:2.1(1a):*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:network_assurance_engine:2.1\(1a\):*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:network_assurance_engine:2.1\(1a\):*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:telepresence_conductor:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:telepresence_conductor:-:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.1:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.2:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.3:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.4:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.1:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.2:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.3:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.4:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:telepresence_video_communication_server:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:telepresence_video_communication_server:-:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.1:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.2:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.3:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.4:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.11:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.1:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.2:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.3:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.4:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.11:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:threat_grid-cloud:-:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:threat_grid-cloud:-:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:webex_hybrid_data_security:-:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:webex_hybrid_data_security:-:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:webex_video_mesh:-:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:webex_video_mesh:-:*:*:*:*:*:*:*:
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_analytics:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_analytics:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_domain_name_system:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_domain_name_system:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_edge_gateway:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_edge_gateway:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_fraud_protection_service:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_fraud_protection_service:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_global_traffic_manager:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_global_traffic_manager:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_webaccelerator:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_webaccelerator:14.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:traffix_systems_signaling_delivery_controller:4.4.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:traffix_systems_signaling_delivery_controller:4.4.0:*:*:*:*:*:*:*:
- cpe:2.3:a:f5:traffix_systems_signaling_delivery_controller:*:*:*:*:*:*:*:*:
- cpe:2.3:a:hp:aruba_airwave_amp:*:*:*:*:*:*:*:*:
- cpe:2.3:a:hp:aruba_airwave_amp:*:*:*:*:*:*:*:*:
- cpe:2.3:a:hp:aruba_clearpass_policy_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:hp:aruba_clearpass_policy_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:4.18:rc1:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:4.18:rc2:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:4.18:rc3:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:4.18:rc4:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:4.18:rc5:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:4.18:rc1:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:4.18:rc2:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:4.18:rc3:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:4.18:rc4:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:4.18:rc5:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:6.4:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:6.4:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*:
- cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*:
- cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE