Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.openwall.com/lists/oss-security/2019/07/06/3
http://www.openwall.com/lists/oss-security/2019/07/06/4
http://www.securityfocus.com/bid/104976
http://www.securitytracker.com/id/1041424
http://www.securitytracker.com/id/1041434
https://access.redhat.com/errata/RHSA-2018:2384
https://access.redhat.com/errata/RHSA-2018:2395
https://access.redhat.com/errata/RHSA-2018:2402
https://access.redhat.com/errata/RHSA-2018:2403
https://access.redhat.com/errata/RHSA-2018:2645
https://access.redhat.com/errata/RHSA-2018:2776
https://access.redhat.com/errata/RHSA-2018:2785
https://access.redhat.com/errata/RHSA-2018:2789
https://access.redhat.com/errata/RHSA-2018:2790
https://access.redhat.com/errata/RHSA-2018:2791
https://access.redhat.com/errata/RHSA-2018:2924
https://access.redhat.com/errata/RHSA-2018:2933
https://access.redhat.com/errata/RHSA-2018:2948
https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf
https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html
https://security.netapp.com/advisory/ntap-20180815-0003/
https://support.f5.com/csp/article/K95343321
https://support.f5.com/csp/article/K95343321?utm_source=f5support&utm_medium=RSS
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp
https://usn.ubuntu.com/3732-1/
https://usn.ubuntu.com/3732-2/
https://usn.ubuntu.com/3741-1/
https://usn.ubuntu.com/3741-2/
https://usn.ubuntu.com/3742-1/
https://usn.ubuntu.com/3742-2/
https://usn.ubuntu.com/3763-1/
https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack
https://www.debian.org/security/2018/dsa-4266
https://www.kb.cert.org/vuls/id/962459
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Source: MITRE
Published: 2018-08-06
Updated: 2020-09-18
Type: CWE-400
Base Score: 7.8
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact Score: 6.9
Exploitability Score: 10
Severity: HIGH
Base Score: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Impact Score: 3.6
Exploitability Score: 3.9
Severity: HIGH
OR
cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
OR
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.18:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.18:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.18:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.18:rc4:*:*:*:*:*:*
OR
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
OR
OR
cpe:2.3:a:hp:aruba_airwave_amp:*:*:*:*:*:*:*:*
cpe:2.3:a:hp:aruba_clearpass_policy_manager:*:*:*:*:*:*:*:* versions from 6.6.0 to 6.6.9 (inclusive)
cpe:2.3:a:hp:aruba_clearpass_policy_manager:*:*:*:*:*:*:*:* versions from 6.7.0 to 6.7.5 (inclusive)
OR
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 11.5.1 to 11.6.3 (inclusive)
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_access_policy_manager:14.0.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 11.5.1 to 11.6.3 (inclusive)
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.0.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 11.5.1 to 11.6.3 (inclusive)
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_analytics:14.0.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 11.5.1 to 11.6.3 (inclusive)
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.0.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 11.5.1 to 11.6.3 (inclusive)
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_application_security_manager:14.0.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 11.5.1 to 11.6.3 (inclusive)
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_domain_name_system:14.0.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 11.5.1. to 11.6.3 (inclusive)
cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_edge_gateway:14.0.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 11.5.1 to 11.6.3 (inclusive)
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_fraud_protection_service:14.0.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 11.5.1 to 11.6.3 (inclusive)
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_global_traffic_manager:14.0.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 11.5.1 to 11.6.3 (inclusive)
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_link_controller:14.0.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 11.5.1 to 11.6.3 (inclusive)
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 12.0.0 to 12.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions up to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_local_traffic_manager:14.0.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 11.5.1 to 11.6.3 (inclusive)
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.0.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 11.5.1 to 11.6.3 (inclusive)
cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.3 (inclusive)
cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_webaccelerator:14.0.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:traffix_systems_signaling_delivery_controller:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:traffix_systems_signaling_delivery_controller:*:*:*:*:*:*:*:* versions from 5.0.0 to 5.1.0 (inclusive)
OR
cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:*:*:*:*:*:*:*
cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:p5:*:*:*:*:*:*
cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:*:*:*:*:*:*:*
cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:p11:*:*:*:*:*:*
cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.1:p8:*:*:*:*:*:*
cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:*:*:*:*:*:*:*
cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:p4:*:*:*:*:*:*
cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:*:*:*:*:*:*:*
cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p1:*:*:*:*:*:*
OR
cpe:2.3:a:cisco:collaboration_meeting_rooms:1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:digital_network_architecture_center:1.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:expressway:x8.10:*:*:*:*:*:*:*
cpe:2.3:a:cisco:expressway:x8.10.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:expressway:x8.10.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:expressway:x8.10.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:expressway:x8.10.4:*:*:*:*:*:*:*
cpe:2.3:a:cisco:expressway:x8.11:*:*:*:*:*:*:*
cpe:2.3:a:cisco:expressway_series:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:meeting_management:1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:meeting_management:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_assurance_engine:2.1\(1a\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:threat_grid-cloud:-:*:*:*:*:*:*:*
AND
OR
cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10:*:*:*:*:*:*:*
cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.3:*:*:*:*:*:*:*
cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.4:*:*:*:*:*:*:*
cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.11:*:*:*:*:*:*:*
OR
cpe:2.3:h:cisco:telepresence_video_communication_server:-:*:*:*:*:*:*:*
AND
OR
cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3:*:*:*:*:*:*:*
cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.3:*:*:*:*:*:*:*
cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.4:*:*:*:*:*:*:*
OR
ID | Name | Product | Family | Severity |
---|---|---|---|---|
138339 | Arista Networks CloudVision Portal DoS (SA0036) | Nessus | Misc. | high |
133724 | Arista Networks EOS/vEOS SegmentSmack TCP DoS (SA0036) | Nessus | Misc. | high |
130423 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2821-1) (SACK Panic) (SACK Slowness) | Nessus | SuSE Local Security Checks | high |
129747 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2601-1) | Nessus | SuSE Local Security Checks | high |
128315 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2230-1) | Nessus | SuSE Local Security Checks | high |
127408 | NewStart CGSL MAIN 4.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0143) | Nessus | NewStart CGSL Local Security Checks | critical |
127233 | NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0049) | Nessus | NewStart CGSL Local Security Checks | high |
127202 | NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel Multiple Vulnerabilities (NS-SA-2019-0034) | Nessus | NewStart CGSL Local Security Checks | high |
126811 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1870-1) (SACK Slowness) | Nessus | SuSE Local Security Checks | high |
126560 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1767-1) | Nessus | SuSE Local Security Checks | high |
125762 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1425-1) | Nessus | SuSE Local Security Checks | high |
124992 | EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1539) | Nessus | Huawei Local Security Checks | critical |
124110 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:0955-1) | Nessus | SuSE Local Security Checks | high |
123260 | openSUSE Security Update : the Linux Kernel (openSUSE-2019-597) | Nessus | SuSE Local Security Checks | low |
121997 | Photon OS 2.0: Linux PHSA-2018-2.0-0101 | Nessus | PhotonOS Local Security Checks | high |
121068 | Juniper Junos Space 18.4.x < 18.4R1 Multiple Vulnerabilities (JSA10917) | Nessus | Junos Local Security Checks | high |
120071 | SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2018:2223-1) | Nessus | SuSE Local Security Checks | low |
119669 | F5 Networks BIG-IP : Linux kernel vulnerability (K95343321) | Nessus | F5 Networks Local Security Checks | high |
119423 | Photon OS 2.0: Linux PHSA-2018-2.0-0101 (deprecated) | Nessus | PhotonOS Local Security Checks | high |
119034 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:3789-1) | Nessus | SuSE Local Security Checks | high |
118513 | RHEL 7 : kernel-alt (RHSA-2018:2948) (Spectre) | Nessus | Red Hat Local Security Checks | high |
118460 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:3470-1) | Nessus | SuSE Local Security Checks | high |
118433 | EulerOS Virtualization 2.5.0 : kernel (EulerOS-SA-2018-1345) | Nessus | Huawei Local Security Checks | high |
118367 | EulerOS Virtualization 2.5.1 : kernel (EulerOS-SA-2018-1322) | Nessus | Huawei Local Security Checks | high |
118349 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:3328-1) | Nessus | SuSE Local Security Checks | high |
118318 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:3265-1) | Nessus | SuSE Local Security Checks | high |
118283 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2344-2) (Foreshadow) | Nessus | SuSE Local Security Checks | high |
118174 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:3172-1) | Nessus | SuSE Local Security Checks | high |
118165 | RHEL 6 : kernel (RHSA-2018:2933) | Nessus | Red Hat Local Security Checks | high |
118163 | RHEL 6 : kernel (RHSA-2018:2924) | Nessus | Red Hat Local Security Checks | high |
117866 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2960-1) | Nessus | SuSE Local Security Checks | high |
117816 | RHEL 6 : MRG (RHSA-2018:2789) | Nessus | Red Hat Local Security Checks | high |
117802 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2864-1) | Nessus | SuSE Local Security Checks | high |
117801 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2860-1) | Nessus | SuSE Local Security Checks | high |
117783 | RHEL 6 : kernel (RHSA-2018:2791) | Nessus | Red Hat Local Security Checks | high |
117782 | RHEL 7 : kernel (RHSA-2018:2790) | Nessus | Red Hat Local Security Checks | high |
117781 | RHEL 7 : kernel (RHSA-2018:2785) | Nessus | Red Hat Local Security Checks | high |
117780 | RHEL 7 : kernel (RHSA-2018:2776) | Nessus | Red Hat Local Security Checks | high |
117663 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2787-1) | Nessus | SuSE Local Security Checks | high |
117514 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4216) | Nessus | Oracle Linux Local Security Checks | high |
117512 | OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0256) | Nessus | OracleVM Local Security Checks | high |
112284 | RHEL 6 : kernel (RHSA-2018:2645) | Nessus | Red Hat Local Security Checks | high |
112238 | EulerOS 2.0 SP3 : kernel (EulerOS-SA-2018-1279) | Nessus | Huawei Local Security Checks | high |
112237 | EulerOS 2.0 SP2 : kernel (EulerOS-SA-2018-1278) | Nessus | Huawei Local Security Checks | high |
112206 | Virtuozzo 7 : OVMF / crit / criu / criu-devel / ksm-vz / etc (VZA-2018-063) | Nessus | Virtuozzo Local Security Checks | high |
112027 | RHEL 7 : Virtualization (RHSA-2018:2403) (Foreshadow) | Nessus | Red Hat Local Security Checks | high |
112026 | RHEL 7 : Virtualization (RHSA-2018:2402) (Foreshadow) | Nessus | Red Hat Local Security Checks | high |
112018 | Virtuozzo 6 : cpupools / cpupools-features / etc (VZA-2018-055) | Nessus | Virtuozzo Local Security Checks | high |
112017 | Ubuntu 14.04 LTS : Linux kernel regressions (USN-3741-3) (Foreshadow) | Nessus | Ubuntu Local Security Checks | high |
111997 | openSUSE Security Update : the Linux Kernel (openSUSE-2018-885) (Foreshadow) | Nessus | SuSE Local Security Checks | high |
111837 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2374-1) (Foreshadow) | Nessus | SuSE Local Security Checks | high |
111815 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2344-1) (Foreshadow) | Nessus | SuSE Local Security Checks | high |
111778 | Scientific Linux Security Update : kernel on SL7.x x86_64 (20180814) (Foreshadow) | Nessus | Scientific Linux Local Security Checks | high |
111763 | Debian DLA-1466-1 : linux-4.9 security update | Nessus | Debian Local Security Checks | high |
111753 | Ubuntu 14.04 LTS : Linux kernel vulnerabilities (USN-3742-1) (Foreshadow) | Nessus | Ubuntu Local Security Checks | high |
111752 | Ubuntu 14.04 LTS : Linux kernel (Xenial HWE) vulnerabilities (USN-3741-2) (Foreshadow) | Nessus | Ubuntu Local Security Checks | high |
111751 | Ubuntu 16.04 LTS : Linux kernel vulnerabilities (USN-3741-1) (Foreshadow) | Nessus | Ubuntu Local Security Checks | high |
111746 | SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:2328-1) (Foreshadow) | Nessus | SuSE Local Security Checks | high |
111736 | RHEL 7 : kernel-rt (RHSA-2018:2395) (Foreshadow) | Nessus | Red Hat Local Security Checks | high |
111731 | RHEL 6 : kernel (RHSA-2018:2390) (Foreshadow) | Nessus | Red Hat Local Security Checks | high |
111727 | RHEL 7 : kernel (RHSA-2018:2384) (Foreshadow) | Nessus | Red Hat Local Security Checks | high |
111725 | Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2018-4195) (Foreshadow) | Nessus | Oracle Linux Local Security Checks | high |
111724 | Oracle Linux 6 : kernel (ELSA-2018-2390) (Foreshadow) | Nessus | Oracle Linux Local Security Checks | high |
111723 | Oracle Linux 7 : kernel (ELSA-2018-2384) (Foreshadow) | Nessus | Oracle Linux Local Security Checks | high |
111704 | CentOS 6 : kernel (CESA-2018:2390) (Foreshadow) | Nessus | CentOS Local Security Checks | high |
111703 | CentOS 7 : kernel (CESA-2018:2384) (Foreshadow) | Nessus | CentOS Local Security Checks | high |
111590 | openSUSE Security Update : the Linux Kernel (openSUSE-2018-826) | Nessus | SuSE Local Security Checks | high |
111580 | Ubuntu 16.04 LTS : linux-hwe, linux-azure, linux-gcp vulnerability (USN-3732-2) | Nessus | Ubuntu Local Security Checks | high |
111579 | Ubuntu 18.04 LTS : linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oem, (USN-3732-1) | Nessus | Ubuntu Local Security Checks | high |
111562 | Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2018-4189) | Nessus | Oracle Linux Local Security Checks | high |
111557 | Debian DSA-4266-1 : linux - security update | Nessus | Debian Local Security Checks | high |
111553 | Amazon Linux AMI : kernel (ALAS-2018-1049) | Nessus | Amazon Linux Local Security Checks | high |
111550 | Amazon Linux 2 : kernel (ALAS-2018-1050) | Nessus | Amazon Linux Local Security Checks | high |