VAR-201205-0016
Vulnerability from variot - Updated: 2026-03-09 22:50The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and sending crafted packets. The NFSv4 implementation is one of the distributed file system protocols. (CVE-2009-4067)
It was discovered that the Stream Control Transmission Protocol (SCTP) implementation incorrectly calculated lengths. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: kernel security and bug fix update Advisory ID: RHSA-2011:1419-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1419.html Issue date: 2011-11-01 CVE Names: CVE-2011-3188 CVE-2011-3209 =====================================================================
- Summary:
Updated kernel packages that fix two security issues and four bugs are now available for Red Hat Enterprise Linux 5.6 Extended Update Support.
The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux (v. 5.6.z server) - i386, ia64, noarch, ppc, s390x, x86_64
- Description:
The kernel packages contain the Linux kernel, the core of any Linux operating system.
This update fixes the following security issues:
-
The way IPv4 and IPv6 protocol sequence numbers and fragment IDs were generated could allow a man-in-the-middle attacker to inject packets and possibly hijack connections. Protocol sequence numbers and fragment IDs are now more random. (CVE-2011-3188, Moderate)
-
A flaw was found in the Linux kernel's clock implementation on 32-bit, SMP (symmetric multiprocessing) systems. A local, unprivileged user could use this flaw to cause a divide error fault, resulting in a denial of service. (CVE-2011-3209, Moderate)
Red Hat would like to thank Dan Kaminsky for reporting CVE-2011-3188, and Yasuaki Ishimatsu for reporting CVE-2011-3209.
In addition, this update fixes the following bugs:
-
When the Global File System 2 (GFS2) file system is suspended, its delete work queue is also suspended, along with any pending work on the queue. Prior to this update, if GFS2's transaction lock was demoted while the delete work queue was suspended, a deadlock could occur on the file system because the file system tried to flush the work queue in the lock demotion code. With this update, the delete work queue is no longer flushed by the lock demotion code, and a deadlock no longer occurs. Instead, the work queue is flushed by the unmount operation, so that pending work is properly completed. (BZ#733678)
-
A previously applied patch introduced a regression for third-party file systems that do not set the FS_HAS_IODONE2 flag, specifically, Oracle Cluster File System 2 (OCFS2). The patch removed a call to the aio_complete function, resulting in no completion events being processed, causing user-space applications to become unresponsive. This update reintroduces the aio_complete function call, fixing this issue. (BZ#734156)
-
Certain devices support multiple operation modes. For example, EMC CLARiiON disk arrays support ALUA mode and their own vendor specific mode for failover. In Red Hat Enterprise Linux 5.5, a bug was discovered that prevented tools such as multipath from being able to select the device/hardware handler plug-in to use. This resulted in the application (for example, multipath) not working properly. With this update, the kernel has been modified to allow applications to select the device/hardware handler to use, thus resolving this issue. (BZ#739900)
-
This update improves the performance of delete/unlink operations in a GFS2 file system with large files by adding a layer of metadata read-ahead for indirect blocks. (BZ#743805)
Users should upgrade to these updated packages, which contain backported patches to resolve these issues. The system must be rebooted for this update to take effect.
- Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259
To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system.
- Bugs fixed (http://bugzilla.redhat.com/):
732658 - CVE-2011-3188 kernel: net: improve sequence number generation 732878 - CVE-2011-3209 kernel: panic occurs when clock_gettime() is called 733678 - GFS2: recovery stuck on transaction lock [rhel-5.6.z] 739900 - scsi_dh_emc gives "error attaching hardware handler" for EMC active-active SANs [rhel-5.6.z]
- Package List:
Red Hat Enterprise Linux (v. 5.6.z server):
Source: kernel-2.6.18-238.28.1.el5.src.rpm
i386: kernel-2.6.18-238.28.1.el5.i686.rpm kernel-PAE-2.6.18-238.28.1.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-238.28.1.el5.i686.rpm kernel-PAE-devel-2.6.18-238.28.1.el5.i686.rpm kernel-debug-2.6.18-238.28.1.el5.i686.rpm kernel-debug-debuginfo-2.6.18-238.28.1.el5.i686.rpm kernel-debug-devel-2.6.18-238.28.1.el5.i686.rpm kernel-debuginfo-2.6.18-238.28.1.el5.i686.rpm kernel-debuginfo-common-2.6.18-238.28.1.el5.i686.rpm kernel-devel-2.6.18-238.28.1.el5.i686.rpm kernel-headers-2.6.18-238.28.1.el5.i386.rpm kernel-xen-2.6.18-238.28.1.el5.i686.rpm kernel-xen-debuginfo-2.6.18-238.28.1.el5.i686.rpm kernel-xen-devel-2.6.18-238.28.1.el5.i686.rpm
ia64: kernel-2.6.18-238.28.1.el5.ia64.rpm kernel-debug-2.6.18-238.28.1.el5.ia64.rpm kernel-debug-debuginfo-2.6.18-238.28.1.el5.ia64.rpm kernel-debug-devel-2.6.18-238.28.1.el5.ia64.rpm kernel-debuginfo-2.6.18-238.28.1.el5.ia64.rpm kernel-debuginfo-common-2.6.18-238.28.1.el5.ia64.rpm kernel-devel-2.6.18-238.28.1.el5.ia64.rpm kernel-headers-2.6.18-238.28.1.el5.ia64.rpm kernel-xen-2.6.18-238.28.1.el5.ia64.rpm kernel-xen-debuginfo-2.6.18-238.28.1.el5.ia64.rpm kernel-xen-devel-2.6.18-238.28.1.el5.ia64.rpm
noarch: kernel-doc-2.6.18-238.28.1.el5.noarch.rpm
ppc: kernel-2.6.18-238.28.1.el5.ppc64.rpm kernel-debug-2.6.18-238.28.1.el5.ppc64.rpm kernel-debug-debuginfo-2.6.18-238.28.1.el5.ppc64.rpm kernel-debug-devel-2.6.18-238.28.1.el5.ppc64.rpm kernel-debuginfo-2.6.18-238.28.1.el5.ppc64.rpm kernel-debuginfo-common-2.6.18-238.28.1.el5.ppc64.rpm kernel-devel-2.6.18-238.28.1.el5.ppc64.rpm kernel-headers-2.6.18-238.28.1.el5.ppc.rpm kernel-headers-2.6.18-238.28.1.el5.ppc64.rpm kernel-kdump-2.6.18-238.28.1.el5.ppc64.rpm kernel-kdump-debuginfo-2.6.18-238.28.1.el5.ppc64.rpm kernel-kdump-devel-2.6.18-238.28.1.el5.ppc64.rpm
s390x: kernel-2.6.18-238.28.1.el5.s390x.rpm kernel-debug-2.6.18-238.28.1.el5.s390x.rpm kernel-debug-debuginfo-2.6.18-238.28.1.el5.s390x.rpm kernel-debug-devel-2.6.18-238.28.1.el5.s390x.rpm kernel-debuginfo-2.6.18-238.28.1.el5.s390x.rpm kernel-debuginfo-common-2.6.18-238.28.1.el5.s390x.rpm kernel-devel-2.6.18-238.28.1.el5.s390x.rpm kernel-headers-2.6.18-238.28.1.el5.s390x.rpm kernel-kdump-2.6.18-238.28.1.el5.s390x.rpm kernel-kdump-debuginfo-2.6.18-238.28.1.el5.s390x.rpm kernel-kdump-devel-2.6.18-238.28.1.el5.s390x.rpm
x86_64: kernel-2.6.18-238.28.1.el5.x86_64.rpm kernel-debug-2.6.18-238.28.1.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-238.28.1.el5.x86_64.rpm kernel-debug-devel-2.6.18-238.28.1.el5.x86_64.rpm kernel-debuginfo-2.6.18-238.28.1.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-238.28.1.el5.x86_64.rpm kernel-devel-2.6.18-238.28.1.el5.x86_64.rpm kernel-headers-2.6.18-238.28.1.el5.x86_64.rpm kernel-xen-2.6.18-238.28.1.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-238.28.1.el5.x86_64.rpm kernel-xen-devel-2.6.18-238.28.1.el5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2011-3188.html https://www.redhat.com/security/data/cve/CVE-2011-3209.html https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFOsCp6XlSAg2UNWIIRAqjtAKC+6itwqo7i/nD2TiB5jAoly0MGowCfU9EU LGpVFEpzls46GkvOInRcpSo= =qH8Q -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04135307
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04135307 Version: 1
HPSBGN02970 rev.1 - HP Rapid Deployment Pack (RDP) or HP Insight Control Server Deployment, Multiple Remote Vulnerabilities affecting Confidentiality, Integrity and Availability
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2014-03-10 Last Updated: 2014-03-10
Potential Security Impact: Multiple remote vulnerabilities affecting confidentiality, integrity and availability
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential vulnerabilities have been identified with HP Rapid Deployment Pack (RDP) or HP Insight Control Server Deployment. The vulnerabilities could be exploited remotely affecting confidentiality, integrity and availability.
References: CVE-2010-4008 CVE-2010-4494 CVE-2011-2182 CVE-2011-2213 CVE-2011-2492
CVE-2011-2518 CVE-2011-2689 CVE-2011-2723 CVE-2011-3188 CVE-2011-4077
CVE-2011-4110 CVE-2012-0058 CVE-2012-0879 CVE-2012-1088 CVE-2012-1179
CVE-2012-2137 CVE-2012-2313 CVE-2012-2372 CVE-2012-2373 CVE-2012-2375
CVE-2012-2383 CVE-2012-2384 CVE-2013-6205 CVE-2013-6206 SSRT101443
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Rapid Deployment Pack (RDP) -- All versions HP Insight Control Server Deployment -- All versions
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2013-6205 (AV:L/AC:M/Au:S/C:P/I:P/A:P) 4.1 CVE-2013-6206 (AV:N/AC:L/Au:N/C:C/I:P/A:P) 9.0 CVE-2010-4008 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2010-4494 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2011-2182 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2 CVE-2011-2213 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9 CVE-2011-2492 (AV:L/AC:M/Au:N/C:P/I:N/A:N) 1.9 CVE-2011-2518 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9 CVE-2011-2689 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9 CVE-2011-2723 (AV:A/AC:M/Au:N/C:N/I:N/A:C) 5.7 CVE-2011-3188 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2011-4077 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9 CVE-2011-4110 (AV:L/AC:L/Au:N/C:N/I:N/A:P) 2.1 CVE-2012-0058 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9 CVE-2012-0879 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9 CVE-2012-1088 (AV:L/AC:M/Au:N/C:N/I:P/A:P) 3.3 CVE-2012-1179 (AV:A/AC:M/Au:S/C:N/I:N/A:C) 5.2 CVE-2012-2137 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9 CVE-2012-2313 (AV:L/AC:H/Au:N/C:N/I:N/A:P) 1.2 CVE-2012-2372 (AV:L/AC:M/Au:S/C:N/I:N/A:C) 4.4 CVE-2012-2373 (AV:L/AC:H/Au:N/C:N/I:N/A:C) 4.0 CVE-2012-2375 (AV:A/AC:H/Au:N/C:N/I:N/A:C) 4.6 CVE-2012-2383 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9 CVE-2012-2384 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP recommends that HP Rapid Deployment Pack (RDP) or HP Insight Control Server Deployment should only be run on private secure networks to prevent the risk of security compromise.
HISTORY Version:1 (rev.1) - 10 March 2014 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
The text of the original advisory is reproduced for reference:
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2011-1020
Kees Cook discovered an issue in the /proc filesystem that allows local
users to gain access to sensitive process information after execution of a
setuid binary.
CVE-2011-1576
Ryan Sweat discovered an issue in the VLAN implementation.
CVE-2011-2484
Vasiliy Kulikov of Openwall discovered that the number of exit handlers that
a process can register is not capped, resulting in local denial of service
through resource exhaustion (cpu time and memory).
CVE-2011-2491
Vasily Averin discovered an issue with the NFS locking implementation. A
malicious NFS server can cause a client to hang indefinitely in an unlock
call.
CVE-2011-2492
Marek Kroemeke and Filip Palian discovered that uninitialized struct
elements in the Bluetooth subsystem could lead to a leak of sensitive kernel
memory through leaked stack memory.
CVE-2011-2495
Vasiliy Kulikov of Openwall discovered that the io file of a process' proc
directory was world-readable, resulting in local information disclosure of
information such as password lengths.
CVE-2011-2496
Robert Swiecki discovered that mremap() could be abused for local denial of
service by triggering a BUG_ON assert.
CVE-2011-2497
Dan Rosenberg discovered an integer underflow in the Bluetooth subsystem,
which could lead to denial of service or privilege escalation.
CVE-2011-2517
It was discovered that the netlink-based wireless configuration interface
performed insufficient length validation when parsing SSIDs, resulting in
buffer overflows.
CVE-2011-2525
Ben Pfaff reported an issue in the network scheduling code.
CVE-2011-2700
Mauro Carvalho Chehab of Red Hat reported a buffer overflow issue in the
driver for the Si4713 FM Radio Transmitter driver used by N900 devices.
CVE-2011-2723
Brent Meshier reported an issue in the GRO (generic receive offload)
implementation. This can be exploited by remote users to create a denial of
service (system crash) in certain network device configurations.
CVE-2011-2905
Christian Ohm discovered that the 'perf' analysis tool searches for its
config files in the current working directory. This could lead to denial of
service or potential privilege escalation if a user with elevated privileges
is tricked into running 'perf' in a directory under the control of the
attacker.
CVE-2011-2909
Vasiliy Kulikov of Openwall discovered that a programming error in
the Comedi driver could lead to the information disclosure through
leaked stack memory.
CVE-2011-2918
Vince Weaver discovered that incorrect handling of software event overflows
in the 'perf' analysis tool could lead to local denial of service.
CVE-2011-2928
Timo Warns discovered that insufficient validation of Be filesystem images
could lead to local denial of service if a malformed filesystem image is
mounted.
CVE-2011-3188
Dan Kaminsky reported a weakness of the sequence number generation in the
TCP protocol implementation. This can be used by remote attackers to inject
packets into an active session.
CVE-2011-3191
Darren Lavender reported an issue in the Common Internet File System (CIFS).
A malicious file server could cause memory corruption leading to a denial of
service.
This update also includes a fix for a regression introduced with the previous security fix for CVE-2011-1768 (Debian: #633738)
For the stable distribution (squeeze), this problem has been fixed in version 2.6.32-35squeeze2. Updates for issues impacting the oldstable distribution (lenny) will be available soon.
The following matrix lists additional source packages that were rebuilt for compatibility with or to take advantage of this update:
Debian 6.0 (squeeze)
user-mode-linux 2.6.32-1um-4+35squeeze2
We recommend that you upgrade your linux-2.6 and user-mode-linux packages. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . ========================================================================== Ubuntu Security Notice USN-1240-1 October 25, 2011
linux-mvl-dove vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description: - linux-mvl-dove: Linux kernel for DOVE
Details:
Ryan Sweat discovered that the kernel incorrectly handled certain VLAN packets. (CVE-2011-1576)
Vasiliy Kulikov and Dan Rosenberg discovered that ecryptfs did not correctly check the origin of mount points. (CVE-2011-1833)
Vasiliy Kulikov discovered that taskstats did not enforce access restrictions. A local attacker could exploit this to read certain information, leading to a loss of privacy. (CVE-2011-2494)
Vasiliy Kulikov discovered that /proc/PID/io did not enforce access restrictions. A local attacker could exploit this to read certain information, leading to a loss of privacy. If a system was using Bluetooth, a remote attacker could send specially crafted traffic to crash the system or gain root privileges. (CVE-2011-2497)
It was discovered that the EXT4 filesystem contained multiple off-by-one flaws. (CVE-2011-2695)
Fernando Gont discovered that the IPv6 stack used predictable fragment identification numbers. (CVE-2011-2905)
Time Warns discovered that long symlinks were incorrectly handled on Be filesystems. An attacker could use this flaw to possibly predict sequence numbers and inject packets. A remote attacker with a malicious server could exploit this to crash the system or possibly execute arbitrary code as the root user. (CVE-2011-3191)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.04 LTS: linux-image-2.6.32-219-dove 2.6.32-219.37
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "big-ip application security manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.1.0"
},
{
"_id": null,
"model": "big-ip global traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.0.0"
},
{
"_id": null,
"model": "big-ip access policy manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.0.0"
},
{
"_id": null,
"model": "big-ip link controller",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "10.0.0"
},
{
"_id": null,
"model": "big-ip protocol security module",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "10.0.0"
},
{
"_id": null,
"model": "big-ip analytics",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.1.0"
},
{
"_id": null,
"model": "big-ip link controller",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.0.0"
},
{
"_id": null,
"model": "firepass",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "6.0.0"
},
{
"_id": null,
"model": "big-ip global traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "10.0.0"
},
{
"_id": null,
"model": "big-ip analytics",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.0.0"
},
{
"_id": null,
"model": "big-ip global traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.1.0"
},
{
"_id": null,
"model": "big-ip edge gateway",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.1.0"
},
{
"_id": null,
"model": "enterprise manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "2.3.0"
},
{
"_id": null,
"model": "big-ip link controller",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.1.0"
},
{
"_id": null,
"model": "big-ip edge gateway",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "10.1.0"
},
{
"_id": null,
"model": "big-ip protocol security module",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.1.0"
},
{
"_id": null,
"model": "kernel",
"scope": "lt",
"trust": 1.0,
"vendor": "linux",
"version": "3.1"
},
{
"_id": null,
"model": "big-ip wan optimization manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "10.2.4"
},
{
"_id": null,
"model": "big-ip webaccelerator",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "10.2.4"
},
{
"_id": null,
"model": "big-ip access policy manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.1.0"
},
{
"_id": null,
"model": "big-ip access policy manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "10.1.0"
},
{
"_id": null,
"model": "big-ip local traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "10.2.4"
},
{
"_id": null,
"model": "firepass",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "7.0.0"
},
{
"_id": null,
"model": "arx",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "6.0.0"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "4.0"
},
{
"_id": null,
"model": "big-ip application security manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "10.2.4"
},
{
"_id": null,
"model": "enterprise manager",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "3.0.0"
},
{
"_id": null,
"model": "arx",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "6.4.0"
},
{
"_id": null,
"model": "big-ip wan optimization manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.0.0"
},
{
"_id": null,
"model": "big-ip webaccelerator",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.0.0"
},
{
"_id": null,
"model": "big-ip local traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.0.0"
},
{
"_id": null,
"model": "big-ip global traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "10.2.4"
},
{
"_id": null,
"model": "enterprise manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "2.1.0"
},
{
"_id": null,
"model": "big-ip edge gateway",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "10.2.4"
},
{
"_id": null,
"model": "big-ip wan optimization manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.1.0"
},
{
"_id": null,
"model": "big-ip application security manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.0.0"
},
{
"_id": null,
"model": "big-ip wan optimization manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "10.0.0"
},
{
"_id": null,
"model": "big-ip link controller",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "10.2.4"
},
{
"_id": null,
"model": "big-ip webaccelerator",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "10.0.0"
},
{
"_id": null,
"model": "firepass",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "6.1.0"
},
{
"_id": null,
"model": "big-ip local traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "10.0.0"
},
{
"_id": null,
"model": "big-ip protocol security module",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "10.2.4"
},
{
"_id": null,
"model": "big-ip webaccelerator",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.1.0"
},
{
"_id": null,
"model": "big-ip access policy manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "10.2.4"
},
{
"_id": null,
"model": "big-ip application security manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "10.0.0"
},
{
"_id": null,
"model": "big-ip edge gateway",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.0.0"
},
{
"_id": null,
"model": "big-ip local traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.1.0"
},
{
"_id": null,
"model": "big-ip protocol security module",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.0.0"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.7,
"vendor": "linux",
"version": "1.2.0"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.7,
"vendor": "linux",
"version": "1.3.0"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.7,
"vendor": "linux",
"version": "2.2.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.7,
"vendor": "linux",
"version": "2.2.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.7,
"vendor": "linux",
"version": "2.2.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.7,
"vendor": "linux",
"version": "2.3.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.7,
"vendor": "linux",
"version": "2.3.10"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.7,
"vendor": "linux",
"version": "2.3.11"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.7,
"vendor": "linux",
"version": "2.3.12"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.7,
"vendor": "linux",
"version": "3.0"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.7"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.8"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.9"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.10"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.11"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.12"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.13"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.14"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.15"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.16"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.17"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.18"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.19"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.20"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.21"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.22"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.23"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.24"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.25"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.26"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.27"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.28"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.29"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.30"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.31"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.32"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.33"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.34"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.35"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.36"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.37"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.38"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.0.39"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.1.89"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.1.132"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.0"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.7"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.8"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.9"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.10"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.11"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.12"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.13"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.14"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.15"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.16"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.17"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.18"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.19"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.20"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.21"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.22"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.23"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.24"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.25"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.26"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.2.27"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.0"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.7"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.8"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.9"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.13"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.14"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.15"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.16"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.17"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.18"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.19"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.20"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.21"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.22"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.23"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.24"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.25"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.26"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.27"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.28"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.29"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.30"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.31"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.32"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.33"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.34"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.35"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.36"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.37"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.38"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.39"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.40"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.41"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.42"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.43"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.44"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.45"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.46"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.47"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.48"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.49"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.50"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.51"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.3.99"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.0"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.7"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.8"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.9"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.10"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.11"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.12"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.13"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.14"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.15"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.16"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.17"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.18"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.19"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.20"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.21"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.22"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.23"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.24"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.25"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.26"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.27"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.28"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.29"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.30"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.31"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.32"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.33"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.33.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.33.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.33.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.33.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.34"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.34.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.34.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.35"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.4.35.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.0"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.7"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.8"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.9"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.10"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.11"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.12"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.13"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.14"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.15"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.16"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.17"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.18"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.19"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.20"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.21"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.22"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.23"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.24"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.25"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.26"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.27"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.28"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.29"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.30"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.31"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.32"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.33"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.34"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.35"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.36"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.37"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.38"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.39"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.40"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.41"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.42"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.43"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.44"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.45"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.46"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.47"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.48"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.49"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.50"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.51"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.52"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.53"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.54"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.55"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.56"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.57"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.58"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.59"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.60"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.61"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.62"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.63"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.64"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.65"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.66"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.67"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.68"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.5.69"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.0"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.7"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.8"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.8.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.9"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.10"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.11"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.11.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.11.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.11.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.11.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.11.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.11.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.11.7"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.11.8"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.11.9"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.11.10"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.11.11"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.11.12"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.12"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.12.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.12.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.12.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.12.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.12.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.12.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.13"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.13.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.13.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.13.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.13.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.13.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.14"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.14.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.14.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.14.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.14.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.14.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.14.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.14.7"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.15"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.15.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.15.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.15.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.15.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.15.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.15.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.15.7"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.15.8"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.15.9"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.15.10"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.15.11"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.7"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.8"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.9"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.10"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.11"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.12"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.13"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.14"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.15"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.16"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.17"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.18"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.19"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.20"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.21"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.22"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.23"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.24"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.25"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.26"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.27"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.28"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.29"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.30"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.31"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.32"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.33"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.34"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.35"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.36"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.37"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.38"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.39"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.40"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.41"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.42"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.43"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.44"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.45"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.46"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.47"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.48"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.49"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.50"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.51"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.52"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.53"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.54"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.55"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.56"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.57"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.58"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.59"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.60"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.61"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.16.62"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.17"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.17.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.17.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.17.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.17.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.17.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.17.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.17.7"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.17.8"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.17.9"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.17.10"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.17.11"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.17.12"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.17.13"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.17.14"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.18"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.18.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.18.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.18.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.18.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.18.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.18.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.18.7"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.18.8"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.19"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.19.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.19.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.19.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.19.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.19.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.19.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.19.7"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.7"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.8"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.9"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.10"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.11"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.12"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.13"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.14"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.15"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.16"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.17"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.18"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.19"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.20"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.20.21"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.21"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.21.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.21.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.21.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.21.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.21.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.21.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.21.7"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.22"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.22.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.22.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.22.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.22.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.22.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.22.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.22.7"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.22.8"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.22.10"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.22.11"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.22.12"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.22.13"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.22.14"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.22.15"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.22.16"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.22.17"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.22.18"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.22.19"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.22.20"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.7"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.8"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.9"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.41"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.42"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.43"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.44"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.45"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.46"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.47"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.48"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.49"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.50"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.51"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.52"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.53"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.54"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.55"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.56"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.57"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.58"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.59"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.60"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.61"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.27.62"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.28"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.28.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.28.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.28.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.28.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.28.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.28.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.28.7"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.28.8"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.28.9"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.28.10"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.29"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.29.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.29.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.29.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.29.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.29.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.29.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.4"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.7"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.8"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.9"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.10"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.11"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.12"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.13"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.14"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.15"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.16"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.17"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.18"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.28"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.29"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.30"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.31"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.32"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.33"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.34"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.35"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.36"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.37"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.38"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.39"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.40"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.41"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.42"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.43"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.44"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.45"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.46"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.47"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.48"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.49"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.50"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.51"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.52"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.53"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.54"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.55"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.56"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.57"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.32.58"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.33.8"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.33.9"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.33.10"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.33.11"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.33.12"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.33.13"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.33.14"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.33.15"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.33.16"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.33.17"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.33.18"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.33.19"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.33.20"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.34.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.34.2"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.34.3"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.34.8"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.34.9"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.34.10"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.35.1"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.35.10"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.35.11"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.35.12"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.35.13"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.37"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.38"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "2.6.39"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "3.0.5"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "3.0.6"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "3.0.7"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "3.0.8"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "3.0.9"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "3.0.10"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "3.0.11"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "3.0.12"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "3.0.13"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "3.0.14"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "3.0.15"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "3.0.16"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "3.0.17"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "3.0.18"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "3.0.19"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "3.0.20"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "3.0.21"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "3.0.22"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "3.0.23"
},
{
"_id": null,
"model": "kernel",
"scope": "eq",
"trust": 0.1,
"vendor": "linux",
"version": "3.0.24"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2011-3188"
},
{
"db": "CNNVD",
"id": "CNNVD-201108-429"
},
{
"db": "NVD",
"id": "CVE-2011-3188"
}
]
},
"credits": {
"_id": null,
"data": "Dan Kaminsky",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201108-429"
}
],
"trust": 0.6
},
"cve": "CVE-2011-3188",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2011-3188",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-51133",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULMON",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2011-3188",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2011-3188",
"impactScore": 5.2,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2011-3188",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "CNNVD",
"id": "CNNVD-201108-429",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-51133",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2011-3188",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-51133"
},
{
"db": "VULMON",
"id": "CVE-2011-3188"
},
{
"db": "CNNVD",
"id": "CNNVD-201108-429"
},
{
"db": "NVD",
"id": "CVE-2011-3188"
}
]
},
"description": {
"_id": null,
"data": "The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and sending crafted packets. The NFSv4 implementation is one of the distributed file system protocols. \n(CVE-2009-4067)\n\nIt was discovered that the Stream Control Transmission Protocol (SCTP)\nimplementation incorrectly calculated lengths. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: kernel security and bug fix update\nAdvisory ID: RHSA-2011:1419-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2011-1419.html\nIssue date: 2011-11-01\nCVE Names: CVE-2011-3188 CVE-2011-3209 \n=====================================================================\n\n1. Summary:\n\nUpdated kernel packages that fix two security issues and four bugs are now\navailable for Red Hat Enterprise Linux 5.6 Extended Update Support. \n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux (v. 5.6.z server) - i386, ia64, noarch, ppc, s390x, x86_64\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. \n\nThis update fixes the following security issues:\n\n* The way IPv4 and IPv6 protocol sequence numbers and fragment IDs were\ngenerated could allow a man-in-the-middle attacker to inject packets and\npossibly hijack connections. Protocol sequence numbers and fragment IDs are\nnow more random. (CVE-2011-3188, Moderate)\n\n* A flaw was found in the Linux kernel\u0027s clock implementation on 32-bit,\nSMP (symmetric multiprocessing) systems. A local, unprivileged user could\nuse this flaw to cause a divide error fault, resulting in a denial of\nservice. (CVE-2011-3209, Moderate)\n\nRed Hat would like to thank Dan Kaminsky for reporting CVE-2011-3188, and\nYasuaki Ishimatsu for reporting CVE-2011-3209. \n\nIn addition, this update fixes the following bugs:\n\n* When the Global File System 2 (GFS2) file system is suspended, its delete\nwork queue is also suspended, along with any pending work on the queue. \nPrior to this update, if GFS2\u0027s transaction lock was demoted while the\ndelete work queue was suspended, a deadlock could occur on the file system\nbecause the file system tried to flush the work queue in the lock demotion\ncode. With this update, the delete work queue is no longer flushed by the\nlock demotion code, and a deadlock no longer occurs. Instead, the work\nqueue is flushed by the unmount operation, so that pending work is properly\ncompleted. (BZ#733678)\n\n* A previously applied patch introduced a regression for third-party file\nsystems that do not set the FS_HAS_IODONE2 flag, specifically, Oracle\nCluster File System 2 (OCFS2). The patch removed a call to the aio_complete\nfunction, resulting in no completion events being processed, causing\nuser-space applications to become unresponsive. This update reintroduces\nthe aio_complete function call, fixing this issue. (BZ#734156)\n\n* Certain devices support multiple operation modes. For example, EMC\nCLARiiON disk arrays support ALUA mode and their own vendor specific mode\nfor failover. In Red Hat Enterprise Linux 5.5, a bug was discovered that\nprevented tools such as multipath from being able to select the\ndevice/hardware handler plug-in to use. This resulted in the application\n(for example, multipath) not working properly. With this update, the kernel\nhas been modified to allow applications to select the device/hardware\nhandler to use, thus resolving this issue. (BZ#739900)\n\n* This update improves the performance of delete/unlink operations in a\nGFS2 file system with large files by adding a layer of metadata read-ahead\nfor indirect blocks. (BZ#743805)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to resolve these issues. The system must be rebooted for this\nupdate to take effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system. \n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n732658 - CVE-2011-3188 kernel: net: improve sequence number generation\n732878 - CVE-2011-3209 kernel: panic occurs when clock_gettime() is called\n733678 - GFS2: recovery stuck on transaction lock [rhel-5.6.z]\n739900 - scsi_dh_emc gives \"error attaching hardware handler\" for EMC active-active SANs [rhel-5.6.z]\n\n6. Package List:\n\nRed Hat Enterprise Linux (v. 5.6.z server):\n\nSource:\nkernel-2.6.18-238.28.1.el5.src.rpm\n\ni386:\nkernel-2.6.18-238.28.1.el5.i686.rpm\nkernel-PAE-2.6.18-238.28.1.el5.i686.rpm\nkernel-PAE-debuginfo-2.6.18-238.28.1.el5.i686.rpm\nkernel-PAE-devel-2.6.18-238.28.1.el5.i686.rpm\nkernel-debug-2.6.18-238.28.1.el5.i686.rpm\nkernel-debug-debuginfo-2.6.18-238.28.1.el5.i686.rpm\nkernel-debug-devel-2.6.18-238.28.1.el5.i686.rpm\nkernel-debuginfo-2.6.18-238.28.1.el5.i686.rpm\nkernel-debuginfo-common-2.6.18-238.28.1.el5.i686.rpm\nkernel-devel-2.6.18-238.28.1.el5.i686.rpm\nkernel-headers-2.6.18-238.28.1.el5.i386.rpm\nkernel-xen-2.6.18-238.28.1.el5.i686.rpm\nkernel-xen-debuginfo-2.6.18-238.28.1.el5.i686.rpm\nkernel-xen-devel-2.6.18-238.28.1.el5.i686.rpm\n\nia64:\nkernel-2.6.18-238.28.1.el5.ia64.rpm\nkernel-debug-2.6.18-238.28.1.el5.ia64.rpm\nkernel-debug-debuginfo-2.6.18-238.28.1.el5.ia64.rpm\nkernel-debug-devel-2.6.18-238.28.1.el5.ia64.rpm\nkernel-debuginfo-2.6.18-238.28.1.el5.ia64.rpm\nkernel-debuginfo-common-2.6.18-238.28.1.el5.ia64.rpm\nkernel-devel-2.6.18-238.28.1.el5.ia64.rpm\nkernel-headers-2.6.18-238.28.1.el5.ia64.rpm\nkernel-xen-2.6.18-238.28.1.el5.ia64.rpm\nkernel-xen-debuginfo-2.6.18-238.28.1.el5.ia64.rpm\nkernel-xen-devel-2.6.18-238.28.1.el5.ia64.rpm\n\nnoarch:\nkernel-doc-2.6.18-238.28.1.el5.noarch.rpm\n\nppc:\nkernel-2.6.18-238.28.1.el5.ppc64.rpm\nkernel-debug-2.6.18-238.28.1.el5.ppc64.rpm\nkernel-debug-debuginfo-2.6.18-238.28.1.el5.ppc64.rpm\nkernel-debug-devel-2.6.18-238.28.1.el5.ppc64.rpm\nkernel-debuginfo-2.6.18-238.28.1.el5.ppc64.rpm\nkernel-debuginfo-common-2.6.18-238.28.1.el5.ppc64.rpm\nkernel-devel-2.6.18-238.28.1.el5.ppc64.rpm\nkernel-headers-2.6.18-238.28.1.el5.ppc.rpm\nkernel-headers-2.6.18-238.28.1.el5.ppc64.rpm\nkernel-kdump-2.6.18-238.28.1.el5.ppc64.rpm\nkernel-kdump-debuginfo-2.6.18-238.28.1.el5.ppc64.rpm\nkernel-kdump-devel-2.6.18-238.28.1.el5.ppc64.rpm\n\ns390x:\nkernel-2.6.18-238.28.1.el5.s390x.rpm\nkernel-debug-2.6.18-238.28.1.el5.s390x.rpm\nkernel-debug-debuginfo-2.6.18-238.28.1.el5.s390x.rpm\nkernel-debug-devel-2.6.18-238.28.1.el5.s390x.rpm\nkernel-debuginfo-2.6.18-238.28.1.el5.s390x.rpm\nkernel-debuginfo-common-2.6.18-238.28.1.el5.s390x.rpm\nkernel-devel-2.6.18-238.28.1.el5.s390x.rpm\nkernel-headers-2.6.18-238.28.1.el5.s390x.rpm\nkernel-kdump-2.6.18-238.28.1.el5.s390x.rpm\nkernel-kdump-debuginfo-2.6.18-238.28.1.el5.s390x.rpm\nkernel-kdump-devel-2.6.18-238.28.1.el5.s390x.rpm\n\nx86_64:\nkernel-2.6.18-238.28.1.el5.x86_64.rpm\nkernel-debug-2.6.18-238.28.1.el5.x86_64.rpm\nkernel-debug-debuginfo-2.6.18-238.28.1.el5.x86_64.rpm\nkernel-debug-devel-2.6.18-238.28.1.el5.x86_64.rpm\nkernel-debuginfo-2.6.18-238.28.1.el5.x86_64.rpm\nkernel-debuginfo-common-2.6.18-238.28.1.el5.x86_64.rpm\nkernel-devel-2.6.18-238.28.1.el5.x86_64.rpm\nkernel-headers-2.6.18-238.28.1.el5.x86_64.rpm\nkernel-xen-2.6.18-238.28.1.el5.x86_64.rpm\nkernel-xen-debuginfo-2.6.18-238.28.1.el5.x86_64.rpm\nkernel-xen-devel-2.6.18-238.28.1.el5.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and \ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2011-3188.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3209.html\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2011 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFOsCp6XlSAg2UNWIIRAqjtAKC+6itwqo7i/nD2TiB5jAoly0MGowCfU9EU\nLGpVFEpzls46GkvOInRcpSo=\n=qH8Q\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04135307\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04135307\nVersion: 1\n\nHPSBGN02970 rev.1 - HP Rapid Deployment Pack (RDP) or HP Insight Control\nServer Deployment, Multiple Remote Vulnerabilities affecting Confidentiality,\nIntegrity and Availability\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2014-03-10\nLast Updated: 2014-03-10\n\nPotential Security Impact: Multiple remote vulnerabilities affecting\nconfidentiality, integrity and availability\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential vulnerabilities have been identified with HP Rapid Deployment Pack\n(RDP) or HP Insight Control Server Deployment. The vulnerabilities could be\nexploited remotely affecting confidentiality, integrity and availability. \n\nReferences: CVE-2010-4008\n CVE-2010-4494\n CVE-2011-2182\n CVE-2011-2213\n CVE-2011-2492\n\nCVE-2011-2518\n CVE-2011-2689\n CVE-2011-2723\n CVE-2011-3188\n CVE-2011-4077\n\nCVE-2011-4110\n CVE-2012-0058\n CVE-2012-0879\n CVE-2012-1088\n CVE-2012-1179\n\nCVE-2012-2137\n CVE-2012-2313\n CVE-2012-2372\n CVE-2012-2373\n CVE-2012-2375\n\nCVE-2012-2383\n CVE-2012-2384\n CVE-2013-6205\n CVE-2013-6206\n SSRT101443\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\nHP Rapid Deployment Pack (RDP) -- All versions\nHP Insight Control Server Deployment -- All versions\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2013-6205 (AV:L/AC:M/Au:S/C:P/I:P/A:P) 4.1\nCVE-2013-6206 (AV:N/AC:L/Au:N/C:C/I:P/A:P) 9.0\nCVE-2010-4008 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\nCVE-2010-4494 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2011-2182 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2\nCVE-2011-2213 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9\nCVE-2011-2492 (AV:L/AC:M/Au:N/C:P/I:N/A:N) 1.9\nCVE-2011-2518 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9\nCVE-2011-2689 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9\nCVE-2011-2723 (AV:A/AC:M/Au:N/C:N/I:N/A:C) 5.7\nCVE-2011-3188 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8\nCVE-2011-4077 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9\nCVE-2011-4110 (AV:L/AC:L/Au:N/C:N/I:N/A:P) 2.1\nCVE-2012-0058 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9\nCVE-2012-0879 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9\nCVE-2012-1088 (AV:L/AC:M/Au:N/C:N/I:P/A:P) 3.3\nCVE-2012-1179 (AV:A/AC:M/Au:S/C:N/I:N/A:C) 5.2\nCVE-2012-2137 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9\nCVE-2012-2313 (AV:L/AC:H/Au:N/C:N/I:N/A:P) 1.2\nCVE-2012-2372 (AV:L/AC:M/Au:S/C:N/I:N/A:C) 4.4\nCVE-2012-2373 (AV:L/AC:H/Au:N/C:N/I:N/A:C) 4.0\nCVE-2012-2375 (AV:A/AC:H/Au:N/C:N/I:N/A:C) 4.6\nCVE-2012-2383 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9\nCVE-2012-2384 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 4.9\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP recommends that HP Rapid Deployment Pack (RDP) or HP Insight Control\nServer Deployment should only be run on private secure networks to prevent\nthe risk of security compromise. \n\nHISTORY\nVersion:1 (rev.1) - 10 March 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n\n\nThe text of the original advisory is reproduced for reference:\n\nSeveral vulnerabilities have been discovered in the Linux kernel that may lead\nto a denial of service or privilege escalation. The Common Vulnerabilities and\nExposures project identifies the following problems:\n\nCVE-2011-1020 \n\n Kees Cook discovered an issue in the /proc filesystem that allows local\n users to gain access to sensitive process information after execution of a\n setuid binary. \n\nCVE-2011-1576 \n\n Ryan Sweat discovered an issue in the VLAN implementation. \n\nCVE-2011-2484 \n\n Vasiliy Kulikov of Openwall discovered that the number of exit handlers that\n a process can register is not capped, resulting in local denial of service\n through resource exhaustion (cpu time and memory). \n\nCVE-2011-2491\n\n Vasily Averin discovered an issue with the NFS locking implementation. A\n malicious NFS server can cause a client to hang indefinitely in an unlock\n call. \n\nCVE-2011-2492 \n\n Marek Kroemeke and Filip Palian discovered that uninitialized struct\n elements in the Bluetooth subsystem could lead to a leak of sensitive kernel\n memory through leaked stack memory. \n\nCVE-2011-2495 \n\n Vasiliy Kulikov of Openwall discovered that the io file of a process\u0027 proc\n directory was world-readable, resulting in local information disclosure of\n information such as password lengths. \n\nCVE-2011-2496 \n\n Robert Swiecki discovered that mremap() could be abused for local denial of\n service by triggering a BUG_ON assert. \n\nCVE-2011-2497\n\n Dan Rosenberg discovered an integer underflow in the Bluetooth subsystem,\n which could lead to denial of service or privilege escalation. \n\nCVE-2011-2517 \n\n It was discovered that the netlink-based wireless configuration interface\n performed insufficient length validation when parsing SSIDs, resulting in\n buffer overflows. \n\nCVE-2011-2525 \n\n Ben Pfaff reported an issue in the network scheduling code. \n\nCVE-2011-2700 \n\n Mauro Carvalho Chehab of Red Hat reported a buffer overflow issue in the\n driver for the Si4713 FM Radio Transmitter driver used by N900 devices. \n\nCVE-2011-2723\n\n Brent Meshier reported an issue in the GRO (generic receive offload)\n implementation. This can be exploited by remote users to create a denial of\n service (system crash) in certain network device configurations. \n\nCVE-2011-2905 \n\n Christian Ohm discovered that the \u0027perf\u0027 analysis tool searches for its\n config files in the current working directory. This could lead to denial of\n service or potential privilege escalation if a user with elevated privileges\n is tricked into running \u0027perf\u0027 in a directory under the control of the\n attacker. \n\nCVE-2011-2909 \n\n Vasiliy Kulikov of Openwall discovered that a programming error in\n the Comedi driver could lead to the information disclosure through \n leaked stack memory. \n\nCVE-2011-2918 \n\n Vince Weaver discovered that incorrect handling of software event overflows\n in the \u0027perf\u0027 analysis tool could lead to local denial of service. \n\nCVE-2011-2928\n\n Timo Warns discovered that insufficient validation of Be filesystem images\n could lead to local denial of service if a malformed filesystem image is\n mounted. \n\nCVE-2011-3188 \n\n Dan Kaminsky reported a weakness of the sequence number generation in the\n TCP protocol implementation. This can be used by remote attackers to inject\n packets into an active session. \n\nCVE-2011-3191\n\n Darren Lavender reported an issue in the Common Internet File System (CIFS). \n A malicious file server could cause memory corruption leading to a denial of\n service. \n\nThis update also includes a fix for a regression introduced with the previous\nsecurity fix for CVE-2011-1768 (Debian: #633738)\n\nFor the stable distribution (squeeze), this problem has been fixed in version\n2.6.32-35squeeze2. Updates for issues impacting the oldstable distribution\n(lenny) will be available soon. \n\nThe following matrix lists additional source packages that were rebuilt for\ncompatibility with or to take advantage of this update:\n\n Debian 6.0 (squeeze)\n user-mode-linux 2.6.32-1um-4+35squeeze2\n\nWe recommend that you upgrade your linux-2.6 and user-mode-linux packages. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. ==========================================================================\nUbuntu Security Notice USN-1240-1\nOctober 25, 2011\n\nlinux-mvl-dove vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 10.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in the kernel. \n\nSoftware Description:\n- linux-mvl-dove: Linux kernel for DOVE\n\nDetails:\n\nRyan Sweat discovered that the kernel incorrectly handled certain VLAN\npackets. \n(CVE-2011-1576)\n\nVasiliy Kulikov and Dan Rosenberg discovered that ecryptfs did not\ncorrectly check the origin of mount points. (CVE-2011-1833)\n\nVasiliy Kulikov discovered that taskstats did not enforce access\nrestrictions. A local attacker could exploit this to read certain\ninformation, leading to a loss of privacy. (CVE-2011-2494)\n\nVasiliy Kulikov discovered that /proc/PID/io did not enforce access\nrestrictions. A local attacker could exploit this to read certain\ninformation, leading to a loss of privacy. If a system was using Bluetooth, a remote attacker\ncould send specially crafted traffic to crash the system or gain root\nprivileges. (CVE-2011-2497)\n\nIt was discovered that the EXT4 filesystem contained multiple off-by-one\nflaws. (CVE-2011-2695)\n\nFernando Gont discovered that the IPv6 stack used predictable fragment\nidentification numbers. \n(CVE-2011-2905)\n\nTime Warns discovered that long symlinks were incorrectly handled on Be\nfilesystems. An attacker could use this flaw to possibly predict\nsequence numbers and inject packets. A remote attacker with a malicious server could exploit this\nto crash the system or possibly execute arbitrary code as the root user. \n(CVE-2011-3191)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 10.04 LTS:\n linux-image-2.6.32-219-dove 2.6.32-219.37\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. Unless you\nmanually uninstalled the standard kernel metapackages (e.g. linux-generic,\nlinux-server, linux-powerpc), a standard system upgrade will automatically\nperform this as well",
"sources": [
{
"db": "NVD",
"id": "CVE-2011-3188"
},
{
"db": "VULHUB",
"id": "VHN-51133"
},
{
"db": "VULMON",
"id": "CVE-2011-3188"
},
{
"db": "PACKETSTORM",
"id": "106036"
},
{
"db": "PACKETSTORM",
"id": "105713"
},
{
"db": "PACKETSTORM",
"id": "105455"
},
{
"db": "PACKETSTORM",
"id": "106496"
},
{
"db": "PACKETSTORM",
"id": "125636"
},
{
"db": "PACKETSTORM",
"id": "106207"
},
{
"db": "PACKETSTORM",
"id": "104991"
},
{
"db": "PACKETSTORM",
"id": "106201"
}
],
"trust": 1.8
},
"exploit_availability": {
"_id": null,
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-51133",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-51133"
}
]
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2011-3188",
"trust": 2.7
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2011/08/23/2",
"trust": 1.8
},
{
"db": "CNNVD",
"id": "CNNVD-201108-429",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2019.4751",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "106496",
"trust": 0.2
},
{
"db": "BID",
"id": "49289",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-51133",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2011-3188",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "106036",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "116124",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "105713",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "105455",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "125636",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "106207",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "104991",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "106201",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-51133"
},
{
"db": "VULMON",
"id": "CVE-2011-3188"
},
{
"db": "PACKETSTORM",
"id": "106036"
},
{
"db": "PACKETSTORM",
"id": "116124"
},
{
"db": "PACKETSTORM",
"id": "105713"
},
{
"db": "PACKETSTORM",
"id": "105455"
},
{
"db": "PACKETSTORM",
"id": "106496"
},
{
"db": "PACKETSTORM",
"id": "125636"
},
{
"db": "PACKETSTORM",
"id": "106207"
},
{
"db": "PACKETSTORM",
"id": "104991"
},
{
"db": "PACKETSTORM",
"id": "106201"
},
{
"db": "CNNVD",
"id": "CNNVD-201108-429"
},
{
"db": "NVD",
"id": "CVE-2011-3188"
}
]
},
"id": "VAR-201205-0016",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-51133"
}
],
"trust": 0.01
},
"last_update_date": "2026-03-09T22:50:50.025000Z",
"patch": {
"_id": null,
"data": [
{
"title": "linux-3.3.7",
"trust": 0.6,
"url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=43221"
},
{
"title": "Red Hat: Important: kernel security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20111465 - Security Advisory"
},
{
"title": "Red Hat: Important: kernel-rt security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20120010 - Security Advisory"
},
{
"title": "Ubuntu Security Notice: linux vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1236-1"
},
{
"title": "Ubuntu Security Notice: linux vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1246-1"
},
{
"title": "Amazon Linux AMI: ALAS-2011-016",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2011-016"
},
{
"title": "Ubuntu Security Notice: linux-lts-backport-maverick vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1242-1"
},
{
"title": "Ubuntu Security Notice: linux vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1243-1"
},
{
"title": "Ubuntu Security Notice: linux-ti-omap4 vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1228-1"
},
{
"title": "Ubuntu Security Notice: linux-ti-omap4 vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1220-1"
},
{
"title": "Ubuntu Security Notice: linux-mvl-dove vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1245-1"
},
{
"title": "Ubuntu Security Notice: linux-ec2 vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1239-1"
},
{
"title": "Ubuntu Security Notice: linux vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1253-1"
},
{
"title": "Ubuntu Security Notice: linux-mvl-dove vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1240-1"
},
{
"title": "Ubuntu Security Notice: linux-fsl-imx51 vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1241-1"
},
{
"title": "Debian Security Advisories: DSA-2310-1 linux-2.6 -- privilege escalation/denial of service/information leak",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=32718749d125111cbdd89954674b3eef"
},
{
"title": "Amazon Linux AMI: ALAS-2011-026",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2011-026"
},
{
"title": "Debian Security Advisories: DSA-2303-2 linux-2.6 -- privilege escalation/denial of service/information leak",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=2a2d240162691a031ffdb625c608418b"
},
{
"title": "VMware Security Advisories: VMware vSphere and vCOps updates to third party libraries",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=ebfa7ecfec1f973ff975279d7fce2976"
},
{
"title": "Ubuntu Security Notice: linux-lts-backport-natty vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1256-1"
},
{
"title": "function_level_granularity",
"trust": 0.1,
"url": "https://github.com/znd15/function_level_granularity "
},
{
"title": "kernel_cve",
"trust": 0.1,
"url": "https://github.com/Parkhomets/kernel_cve "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2011-3188"
},
{
"db": "CNNVD",
"id": "CNNVD-201108-429"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2011-3188"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 1.8,
"url": "http://www.openwall.com/lists/oss-security/2011/08/23/2"
},
{
"trust": 1.8,
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/changelog-3.1"
},
{
"trust": 1.8,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732658"
},
{
"trust": 1.8,
"url": "https://github.com/torvalds/linux/commit/6e5714eaf77d79ae1c8b47e3e040ff5411b717ec"
},
{
"trust": 1.8,
"url": "https://github.com/torvalds/linux/commit/bc0b96b54a21246e377122d54569eef71cec535f"
},
{
"trust": 1.7,
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=6e5714eaf77d79ae1c8b47e3e040ff5411b717ec"
},
{
"trust": 1.7,
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=bc0b96b54a21246e377122d54569eef71cec535f"
},
{
"trust": 1.7,
"url": "http://marc.info/?l=bugtraq\u0026m=139447903326211\u0026w=2"
},
{
"trust": 1.6,
"url": "https://support.f5.com/csp/article/k15301?utm_source=f5support\u0026amp%3butm_medium=rss"
},
{
"trust": 0.9,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3188"
},
{
"trust": 0.7,
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6e5714eaf77d79ae1c8b47e3e040ff5411b717ec"
},
{
"trust": 0.7,
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bc0b96b54a21246e377122d54569eef71cec535f"
},
{
"trust": 0.7,
"url": "https://support.f5.com/csp/article/k15301?utm_source=f5support\u0026utm_medium=rss"
},
{
"trust": 0.6,
"url": "https://support.f5.com/csp/article/k15301"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2019.4751/"
},
{
"trust": 0.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2723"
},
{
"trust": 0.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2497"
},
{
"trust": 0.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3191"
},
{
"trust": 0.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2928"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2213"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2700"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2495"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2695"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1576"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2494"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1020"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3209"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4110"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1833"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2496"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2699"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2484"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1776"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2492"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2905"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=139447903326211\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "https://support.f5.com/csp/article/k15301?utm_source=f5support\u0026amp;amp%3butm_medium=rss"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/.html"
},
{
"trust": 0.1,
"url": "https://www.rapid7.com/db/vulnerabilities/vmsa-2012-0013-cve-2011-3188"
},
{
"trust": 0.1,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=24018"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://usn.ubuntu.com/1236-1/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-4067"
},
{
"trust": 0.1,
"url": "http://www.ubuntu.com/usn/usn-1236-1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux/2.6.24-29.95"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1573"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-4410"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4109"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4325"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-0830"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4128"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3363"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-5029"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4108"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-2761"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4577"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-5064"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-4180"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-0014"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1089"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-4252"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4609"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3597"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4132"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4324"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4576"
},
{
"trust": 0.1,
"url": "http://www.ubuntu.com/usn/usn-1228-1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-ti-omap4/2.6.38-1209.16"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-ti-omap4/2.6.35-903.25"
},
{
"trust": 0.1,
"url": "http://www.ubuntu.com/usn/usn-1220-1"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
},
{
"trust": 0.1,
"url": "https://rhn.redhat.com/errata/rhsa-2011-1419.html"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2011-3188.html"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/kb/docs/doc-11259"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/team/key/#package"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2011-3209.html"
},
{
"trust": 0.1,
"url": "http://bugzilla.redhat.com/):"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/team/contact/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-2383"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0879"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0058"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2518"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-2137"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2689"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-2373"
},
{
"trust": 0.1,
"url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-6205"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4077"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-2384"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-4008"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-2375"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-4494"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-6206"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2182"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-2313"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-2372"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-1179"
},
{
"trust": 0.1,
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/"
},
{
"trust": 0.1,
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-1088"
},
{
"trust": 0.1,
"url": "http://www.ubuntu.com/usn/usn-1246-1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux/2.6.38-12.51"
},
{
"trust": 0.1,
"url": "http://secunia.com/"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/faq"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2525"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2517"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2491"
},
{
"trust": 0.1,
"url": "http://lists.grok.org.uk/full-disclosure-charter.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2909"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2918"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-mvl-dove/2.6.32-219.37"
},
{
"trust": 0.1,
"url": "http://www.ubuntu.com/usn/usn-1240-1"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-51133"
},
{
"db": "VULMON",
"id": "CVE-2011-3188"
},
{
"db": "PACKETSTORM",
"id": "106036"
},
{
"db": "PACKETSTORM",
"id": "116124"
},
{
"db": "PACKETSTORM",
"id": "105713"
},
{
"db": "PACKETSTORM",
"id": "105455"
},
{
"db": "PACKETSTORM",
"id": "106496"
},
{
"db": "PACKETSTORM",
"id": "125636"
},
{
"db": "PACKETSTORM",
"id": "106207"
},
{
"db": "PACKETSTORM",
"id": "104991"
},
{
"db": "PACKETSTORM",
"id": "106201"
},
{
"db": "CNNVD",
"id": "CNNVD-201108-429"
},
{
"db": "NVD",
"id": "CVE-2011-3188"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "VULHUB",
"id": "VHN-51133",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2011-3188",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "106036",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "116124",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "105713",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "105455",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "106496",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "125636",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "106207",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "104991",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "106201",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201108-429",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2011-3188",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2012-05-24T00:00:00",
"db": "VULHUB",
"id": "VHN-51133",
"ident": null
},
{
"date": "2012-05-24T00:00:00",
"db": "VULMON",
"id": "CVE-2011-3188",
"ident": null
},
{
"date": "2011-10-20T23:03:45",
"db": "PACKETSTORM",
"id": "106036",
"ident": null
},
{
"date": "2012-09-01T00:00:25",
"db": "PACKETSTORM",
"id": "116124",
"ident": null
},
{
"date": "2011-10-12T14:47:51",
"db": "PACKETSTORM",
"id": "105713",
"ident": null
},
{
"date": "2011-09-29T23:48:37",
"db": "PACKETSTORM",
"id": "105455",
"ident": null
},
{
"date": "2011-11-02T00:16:12",
"db": "PACKETSTORM",
"id": "106496",
"ident": null
},
{
"date": "2014-03-11T01:16:40",
"db": "PACKETSTORM",
"id": "125636",
"ident": null
},
{
"date": "2011-10-25T19:56:16",
"db": "PACKETSTORM",
"id": "106207",
"ident": null
},
{
"date": "2011-09-11T17:35:34",
"db": "PACKETSTORM",
"id": "104991",
"ident": null
},
{
"date": "2011-10-25T19:53:14",
"db": "PACKETSTORM",
"id": "106201",
"ident": null
},
{
"date": "1900-01-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201108-429",
"ident": null
},
{
"date": "2012-05-24T23:55:02.213000",
"db": "NVD",
"id": "CVE-2011-3188",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2023-02-13T00:00:00",
"db": "VULHUB",
"id": "VHN-51133",
"ident": null
},
{
"date": "2020-07-29T00:00:00",
"db": "VULMON",
"id": "CVE-2011-3188",
"ident": null
},
{
"date": "2023-02-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201108-429",
"ident": null
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2011-3188",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201108-429"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Linux Kernel Authorization problem vulnerability",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201108-429"
}
],
"trust": 0.6
},
"type": {
"_id": null,
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201108-429"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.