Guest

Preview Tool

Cisco Bug: CSCvu65479 - 10.5.2 Multiple Vulnerabilities in kernel

Last Modified

Jun 23, 2020

Products (1)

  • Cisco Unified Communications Manager (CallManager)

Known Affected Releases

10.5(2.10000.5)

Description (partial)

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2009-4307 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4307
CVE-2010-1162 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1162
CVE-2010-2478 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2478
CVE-2010-2959 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2959
CVE-2010-3873 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3873
CVE-2010-4164 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4164
CVE-2010-4342 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4342
CVE-2011-0709 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0709
CVE-2011-1493 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1493
CVE-2011-2184 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2184
CVE-2011-2189 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2189
CVE-2011-4913 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4913
CVE-2013-4300 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4300
CVE-2013-4348 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4348
CVE-2013-4587 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4587
CVE-2013-6282 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6282
CVE-2013-7445 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445
CVE-2016-4951 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4951
CVE-2017-5576 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5576
CVE-2017-6347 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6347
CVE-2018-6412 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6412
CVE-2019-14815 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14815
CVE-2019-18675 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18675
CVE-2019-18807 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18807
CVE-2019-18808 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18808
CVE-2019-18809 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18809
CVE-2019-18810 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18810
CVE-2019-18811 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18811
CVE-2019-18812 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18812
CVE-2019-18813 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18813
CVE-2019-19043 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19043
CVE-2019-19044 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19044
CVE-2019-19045 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19045
CVE-2019-19047 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19047
CVE-2019-19048 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19048
CVE-2019-19050 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19050
CVE-2019-19051 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19051
CVE-2019-19052 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19052
CVE-2019-19053 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19053
CVE-2019-19054 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19054
CVE-2019-19068 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19068
CVE-2019-19069 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19069
CVE-2019-19241 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19241
CVE-2019-19252 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19252
CVE-2019-19543 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19543
CVE-2019-19602 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19602
CVE-2019-19769 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19769

This bug was opened to address the potential impact on this product.

Conditions:
Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.