Guest

Preview Tool

Cisco Bug: CSCvu64876 - CIAM: linux-kernel 3.14.39 need to investigate vulnerabilities (2016)

Last Modified

Oct 04, 2020

Products (1)

  • Cisco Firepower 9300 Series

Known Affected Releases

r291

Description (partial)

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2016-0723 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0723
CVE-2016-0728 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0728
CVE-2016-0758 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0758
CVE-2016-10044 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10044
CVE-2016-10088 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10088
CVE-2016-10200 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10200
CVE-2016-10318 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10318
CVE-2016-1583 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1583
CVE-2016-2069 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2069
CVE-2016-2384 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384
CVE-2016-2543 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2543
CVE-2016-2548 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2548
CVE-2016-2549 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2549
CVE-2016-3070 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3070
CVE-2016-3134 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3134
CVE-2016-3672 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3672
CVE-2016-3713 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3713
CVE-2016-3841 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3841
CVE-2016-3955 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3955
CVE-2016-4482 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4482
CVE-2016-4485 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4485
CVE-2016-4565 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4565
CVE-2016-4580 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4580
CVE-2016-4805 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4805
CVE-2016-4997 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997
CVE-2016-5195 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195
CVE-2016-5828 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5828
CVE-2016-5829 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5829
CVE-2016-6187 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6187
CVE-2016-6786 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786
CVE-2016-6787 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787
CVE-2016-7042 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042
CVE-2016-7117 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7117
CVE-2016-7425 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425
CVE-2016-7910 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7910
CVE-2016-7911 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7911
CVE-2016-8632 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8632
CVE-2016-8655 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655
CVE-2016-8658 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8658
CVE-2016-8666 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8666
CVE-2016-9083 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9083
CVE-2016-9084 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9084
CVE-2016-9120 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9120
CVE-2016-9313 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9313
CVE-2016-9555 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9555
CVE-2016-9754 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9754
CVE-2016-9793 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9793
CVE-2016-9794 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9794
CVE-2016-9806 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9806
CVE-2016-9919 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9919

The affected third-party software component has been upgraded to a version that includes fixes for the vulnerability. Future versions of the product(s) will not be affected by this vulnerability.

Conditions:
Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.