Guest

Preview Tool

Cisco Bug: CSCvu39040 - System Utilities kernel vulnerabilities RHSA-2020:2082 to RHSA-2019:1873

Last Modified

Oct 13, 2020

Products (1)

  • Cisco Identity Services Engine

Known Affected Releases

3.0(0.350)

Description (partial)

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2015-9289 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9289
CVE-2018-10853 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10853
CVE-2018-13053 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13053
CVE-2018-13093 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13093
CVE-2018-13094 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13094
CVE-2018-13095 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13095
CVE-2018-14734 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14734
CVE-2018-15594 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15594
CVE-2018-16885 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16885
CVE-2018-18281 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18281
CVE-2018-19985 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19985
CVE-2018-20169 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20169
CVE-2018-20856 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856
CVE-2018-7191 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7191
CVE-2018-7755 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7755
CVE-2019-10207 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207
CVE-2019-10638 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
CVE-2019-11487 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11487
CVE-2019-11599 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599
CVE-2019-11810 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11810
CVE-2019-11811 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11811
CVE-2019-11833 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833
CVE-2019-11884 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884
CVE-2019-13233 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233
CVE-2019-13648 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648
CVE-2019-14283 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283
CVE-2019-14816 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14816
CVE-2019-14821 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14821
CVE-2019-14835 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835
CVE-2019-14895 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14895
CVE-2019-14898 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14898
CVE-2019-14901 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14901
CVE-2019-15090 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15090
CVE-2019-15221 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15221
CVE-2019-15916 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916
CVE-2019-16746 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16746
CVE-2019-17133 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17133
CVE-2019-17666 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17666
CVE-2019-18660 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18660
CVE-2019-3460 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3460
CVE-2019-3882 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882
CVE-2019-3900 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900
CVE-2019-3901 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3901
CVE-2019-5489 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489
CVE-2019-7222 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7222

These bugs were opened proactively to investigate potential security impact(s) on the product. At this time, the product is not confirmed to be affected by any of the CVE(s).

Conditions:
Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.