Guest

Preview Tool

Cisco Bug: CSCvu65582 - 10.5.2 Multiple Vulnerabilities in kernel

Last Modified

Jun 24, 2020

Products (1)

  • Cisco Unified Communications Manager (CallManager)

Known Affected Releases

10.5(2.10000.5)

Description (partial)

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2015-0239 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0239
CVE-2015-1339 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1339
CVE-2015-2042 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2042
CVE-2015-2666 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2666
CVE-2015-2672 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2672
CVE-2015-3339 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3339
CVE-2015-4167 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4167
CVE-2015-4176 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4176
CVE-2015-4177 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4177
CVE-2015-4178 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4178
CVE-2015-5257 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5257
CVE-2015-5707 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5707
CVE-2015-6526 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6526
CVE-2015-7509 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7509
CVE-2015-8324 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8324
CVE-2015-8660 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8660
CVE-2015-8816 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8816
CVE-2015-8944 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8944
CVE-2015-8950 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8950
CVE-2015-8953 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8953
CVE-2015-8964 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8964
CVE-2016-10147 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10147
CVE-2016-10208 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10208
CVE-2016-2053 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2053
CVE-2016-2188 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2188
CVE-2016-2550 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2550
CVE-2016-3136 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3136
CVE-2016-3139 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3139
CVE-2016-3140 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3140
CVE-2016-3156 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3156
CVE-2016-4569 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4569
CVE-2016-4578 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4578
CVE-2016-4581 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4581
CVE-2016-5412 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5412
CVE-2016-6136 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6136
CVE-2016-6213 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6213
CVE-2016-6327 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6327
CVE-2016-6480 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480
CVE-2016-6828 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6828
CVE-2016-7042 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042
CVE-2016-7097 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097
CVE-2016-7914 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7914
CVE-2016-7915 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7915
CVE-2016-8630 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8630
CVE-2016-8645 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8645
CVE-2016-8646 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8646
CVE-2016-8650 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8650
CVE-2016-9191 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191
CVE-2016-9588 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9588
CVE-2016-9685 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9685

This bug was opened to address the potential impact on this product.

Conditions:
Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.