Guest

Preview Tool

Cisco Bug: CSCvv93988 - CIAM: linux-kernel 4.1.21 CVE-2017-2583 and others

Last Modified

Oct 08, 2020

Products (1)

  • Cisco Nexus 9000 Series Switches

Known Affected Releases

9.3(5)

Description (partial)

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2015-8966 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8966
CVE-2016-0728 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0728
CVE-2016-0758 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0758
CVE-2016-10088 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10088
CVE-2016-1575 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1575
CVE-2016-1576 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1576
CVE-2016-1583 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1583
CVE-2016-3070 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3070
CVE-2016-3134 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3134
CVE-2016-3672 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3672
CVE-2016-4557 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4557
CVE-2016-4565 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4565
CVE-2016-4794 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4794
CVE-2016-4805 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4805
CVE-2016-4913 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4913
CVE-2016-4951 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4951
CVE-2016-4997 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997
CVE-2016-5195 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195
CVE-2016-5828 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5828
CVE-2016-5829 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5829
CVE-2016-6187 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6187
CVE-2016-7425 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425
CVE-2016-7911 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7911
CVE-2016-7912 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7912
CVE-2016-7913 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7913
CVE-2016-8632 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8632
CVE-2016-8655 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655
CVE-2016-9083 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9083
CVE-2016-9084 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9084
CVE-2016-9120 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9120
CVE-2016-9576 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9576
CVE-2016-9754 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9754
CVE-2016-9793 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9793
CVE-2016-9794 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9794
CVE-2016-9806 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9806
CVE-2017-1000363 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000363
CVE-2017-1000365 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365
CVE-2017-1000370 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000370
CVE-2017-10662 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10662
CVE-2017-10663 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10663
CVE-2017-11176 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176
CVE-2017-11473 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11473
CVE-2017-15115 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15115
CVE-2017-15265 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15265
CVE-2017-15649 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15649
CVE-2017-15951 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15951
CVE-2017-16526 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
CVE-2017-16939 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
CVE-2017-17052 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17052
CVE-2017-2583 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583

The affected third-party software component has been upgraded to a version that includes fixes for the vulnerability. Future versions of the product(s) will not be affected by this vulnerability.

Conditions:
Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.