var-201906-1176
Vulnerability from variot

Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e. Multiple TCP Selective Acknowledgement (SACK) and Maximum Segment Size (MSS) networking vulnerabilities may cause denial-of-service conditions in Linux and FreeBSD kernels. Linux Kernel Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Linux Kernel is prone to a denial-of-service vulnerability. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2019:1488-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:1488 Issue date: 2019-06-17 CVE Names: CVE-2019-3896 CVE-2019-11477 CVE-2019-11478 CVE-2019-11479 ==================================================================== 1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

  1. While processing SACK segments, the Linux kernel's socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)

  2. kernel: Double free in lib/idr.c (CVE-2019-3896)

  3. Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)

  4. Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • MDS mitigations not enabled on Intel Skylake CPUs (BZ#1710081)

  • RHEL6 kernel does not disable SMT with mds=full,nosmt (BZ#1710121)

  • [RHEL6] md_clear flag missing from /proc/cpuinfo (BZ#1710517)

  • Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

  1. Bugs fixed (https://bugzilla.redhat.com/):

1694812 - CVE-2019-3896 kernel: Double free in lib/idr.c 1719123 - CVE-2019-11477 Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service 1719128 - CVE-2019-11478 Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service 1719129 - CVE-2019-11479 Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service

  1. Package List:

Red Hat Enterprise Linux Desktop (v. 6):

Source: kernel-2.6.32-754.15.3.el6.src.rpm

i386: kernel-2.6.32-754.15.3.el6.i686.rpm kernel-debug-2.6.32-754.15.3.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.15.3.el6.i686.rpm kernel-debug-devel-2.6.32-754.15.3.el6.i686.rpm kernel-debuginfo-2.6.32-754.15.3.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.15.3.el6.i686.rpm kernel-devel-2.6.32-754.15.3.el6.i686.rpm kernel-headers-2.6.32-754.15.3.el6.i686.rpm perf-2.6.32-754.15.3.el6.i686.rpm perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm

noarch: kernel-abi-whitelists-2.6.32-754.15.3.el6.noarch.rpm kernel-doc-2.6.32-754.15.3.el6.noarch.rpm kernel-firmware-2.6.32-754.15.3.el6.noarch.rpm

x86_64: kernel-2.6.32-754.15.3.el6.x86_64.rpm kernel-debug-2.6.32-754.15.3.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-754.15.3.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm kernel-debug-devel-2.6.32-754.15.3.el6.i686.rpm kernel-debug-devel-2.6.32-754.15.3.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.15.3.el6.i686.rpm kernel-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-754.15.3.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-754.15.3.el6.x86_64.rpm kernel-devel-2.6.32-754.15.3.el6.x86_64.rpm kernel-headers-2.6.32-754.15.3.el6.x86_64.rpm perf-2.6.32-754.15.3.el6.x86_64.rpm perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm

Red Hat Enterprise Linux Desktop Optional (v. 6):

i386: kernel-debug-debuginfo-2.6.32-754.15.3.el6.i686.rpm kernel-debuginfo-2.6.32-754.15.3.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.15.3.el6.i686.rpm perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm python-perf-2.6.32-754.15.3.el6.i686.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm

x86_64: kernel-debug-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-754.15.3.el6.x86_64.rpm perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm python-perf-2.6.32-754.15.3.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm

Red Hat Enterprise Linux HPC Node (v. 6):

Source: kernel-2.6.32-754.15.3.el6.src.rpm

noarch: kernel-abi-whitelists-2.6.32-754.15.3.el6.noarch.rpm kernel-doc-2.6.32-754.15.3.el6.noarch.rpm kernel-firmware-2.6.32-754.15.3.el6.noarch.rpm

x86_64: kernel-2.6.32-754.15.3.el6.x86_64.rpm kernel-debug-2.6.32-754.15.3.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-754.15.3.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm kernel-debug-devel-2.6.32-754.15.3.el6.i686.rpm kernel-debug-devel-2.6.32-754.15.3.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.15.3.el6.i686.rpm kernel-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-754.15.3.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-754.15.3.el6.x86_64.rpm kernel-devel-2.6.32-754.15.3.el6.x86_64.rpm kernel-headers-2.6.32-754.15.3.el6.x86_64.rpm perf-2.6.32-754.15.3.el6.x86_64.rpm perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm

Red Hat Enterprise Linux HPC Node Optional (v. 6):

x86_64: kernel-debug-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-754.15.3.el6.x86_64.rpm perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm python-perf-2.6.32-754.15.3.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm

Red Hat Enterprise Linux Server (v. 6):

Source: kernel-2.6.32-754.15.3.el6.src.rpm

i386: kernel-2.6.32-754.15.3.el6.i686.rpm kernel-debug-2.6.32-754.15.3.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.15.3.el6.i686.rpm kernel-debug-devel-2.6.32-754.15.3.el6.i686.rpm kernel-debuginfo-2.6.32-754.15.3.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.15.3.el6.i686.rpm kernel-devel-2.6.32-754.15.3.el6.i686.rpm kernel-headers-2.6.32-754.15.3.el6.i686.rpm perf-2.6.32-754.15.3.el6.i686.rpm perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm

noarch: kernel-abi-whitelists-2.6.32-754.15.3.el6.noarch.rpm kernel-doc-2.6.32-754.15.3.el6.noarch.rpm kernel-firmware-2.6.32-754.15.3.el6.noarch.rpm

ppc64: kernel-2.6.32-754.15.3.el6.ppc64.rpm kernel-bootwrapper-2.6.32-754.15.3.el6.ppc64.rpm kernel-debug-2.6.32-754.15.3.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-754.15.3.el6.ppc64.rpm kernel-debug-devel-2.6.32-754.15.3.el6.ppc64.rpm kernel-debuginfo-2.6.32-754.15.3.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-754.15.3.el6.ppc64.rpm kernel-devel-2.6.32-754.15.3.el6.ppc64.rpm kernel-headers-2.6.32-754.15.3.el6.ppc64.rpm perf-2.6.32-754.15.3.el6.ppc64.rpm perf-debuginfo-2.6.32-754.15.3.el6.ppc64.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.ppc64.rpm

s390x: kernel-2.6.32-754.15.3.el6.s390x.rpm kernel-debug-2.6.32-754.15.3.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-754.15.3.el6.s390x.rpm kernel-debug-devel-2.6.32-754.15.3.el6.s390x.rpm kernel-debuginfo-2.6.32-754.15.3.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-754.15.3.el6.s390x.rpm kernel-devel-2.6.32-754.15.3.el6.s390x.rpm kernel-headers-2.6.32-754.15.3.el6.s390x.rpm kernel-kdump-2.6.32-754.15.3.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-754.15.3.el6.s390x.rpm kernel-kdump-devel-2.6.32-754.15.3.el6.s390x.rpm perf-2.6.32-754.15.3.el6.s390x.rpm perf-debuginfo-2.6.32-754.15.3.el6.s390x.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.s390x.rpm

x86_64: kernel-2.6.32-754.15.3.el6.x86_64.rpm kernel-debug-2.6.32-754.15.3.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-754.15.3.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm kernel-debug-devel-2.6.32-754.15.3.el6.i686.rpm kernel-debug-devel-2.6.32-754.15.3.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.15.3.el6.i686.rpm kernel-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-754.15.3.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-754.15.3.el6.x86_64.rpm kernel-devel-2.6.32-754.15.3.el6.x86_64.rpm kernel-headers-2.6.32-754.15.3.el6.x86_64.rpm perf-2.6.32-754.15.3.el6.x86_64.rpm perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 6):

i386: kernel-debug-debuginfo-2.6.32-754.15.3.el6.i686.rpm kernel-debuginfo-2.6.32-754.15.3.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.15.3.el6.i686.rpm perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm python-perf-2.6.32-754.15.3.el6.i686.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm

ppc64: kernel-debug-debuginfo-2.6.32-754.15.3.el6.ppc64.rpm kernel-debuginfo-2.6.32-754.15.3.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-754.15.3.el6.ppc64.rpm perf-debuginfo-2.6.32-754.15.3.el6.ppc64.rpm python-perf-2.6.32-754.15.3.el6.ppc64.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.ppc64.rpm

s390x: kernel-debug-debuginfo-2.6.32-754.15.3.el6.s390x.rpm kernel-debuginfo-2.6.32-754.15.3.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-754.15.3.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-754.15.3.el6.s390x.rpm perf-debuginfo-2.6.32-754.15.3.el6.s390x.rpm python-perf-2.6.32-754.15.3.el6.s390x.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.s390x.rpm

x86_64: kernel-debug-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-754.15.3.el6.x86_64.rpm perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm python-perf-2.6.32-754.15.3.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 6):

Source: kernel-2.6.32-754.15.3.el6.src.rpm

i386: kernel-2.6.32-754.15.3.el6.i686.rpm kernel-debug-2.6.32-754.15.3.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.15.3.el6.i686.rpm kernel-debug-devel-2.6.32-754.15.3.el6.i686.rpm kernel-debuginfo-2.6.32-754.15.3.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.15.3.el6.i686.rpm kernel-devel-2.6.32-754.15.3.el6.i686.rpm kernel-headers-2.6.32-754.15.3.el6.i686.rpm perf-2.6.32-754.15.3.el6.i686.rpm perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm

noarch: kernel-abi-whitelists-2.6.32-754.15.3.el6.noarch.rpm kernel-doc-2.6.32-754.15.3.el6.noarch.rpm kernel-firmware-2.6.32-754.15.3.el6.noarch.rpm

x86_64: kernel-2.6.32-754.15.3.el6.x86_64.rpm kernel-debug-2.6.32-754.15.3.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-754.15.3.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm kernel-debug-devel-2.6.32-754.15.3.el6.i686.rpm kernel-debug-devel-2.6.32-754.15.3.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.15.3.el6.i686.rpm kernel-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-754.15.3.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-754.15.3.el6.x86_64.rpm kernel-devel-2.6.32-754.15.3.el6.x86_64.rpm kernel-headers-2.6.32-754.15.3.el6.x86_64.rpm perf-2.6.32-754.15.3.el6.x86_64.rpm perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 6):

i386: kernel-debug-debuginfo-2.6.32-754.15.3.el6.i686.rpm kernel-debuginfo-2.6.32-754.15.3.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.15.3.el6.i686.rpm perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm python-perf-2.6.32-754.15.3.el6.i686.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm

x86_64: kernel-debug-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-754.15.3.el6.x86_64.rpm perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm python-perf-2.6.32-754.15.3.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2019-3896 https://access.redhat.com/security/cve/CVE-2019-11477 https://access.redhat.com/security/cve/CVE-2019-11478 https://access.redhat.com/security/cve/CVE-2019-11479 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/tcpsack

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBXQfbBdzjgjWX9erEAQjjiw//QtCd50n/kyijAWgyi02UAPD+QrPWRv6a gLSESiQGCl7YvWgt96eI5DANREmFMWQ8wB0LRku4KJ4tutBdTcyouWrHgHEYhXLB 24ZBi8HB/L9EhxKoQlHlY68ekZzbOcjqZhrL5K2xUnoVTJDo/+d+vtJgOIlrV/PC aXxRL5nez5Y8pjCiwqm37RP7OUnn6daLtqcu42DR9XovXqORrfJVo43+5HR0drLA ZB2B0ERUU+iFKpS6p9qIgfMLR9KRlMikeI+NRU/1JBjEDT5C4uT4fqULjM4a4QcR 4Cm+wN6ku7CTK8l+1RAKSAn12KMjHUfMhWT1X0XFTFl3lFifL6o6+5D0OVSM68xL k+E8pmoilN1nFk49Z9uLDbCJogLbPdgSOZohiuYLBfUE4IUy0OiCodmKRlQBxWTK tYBMbUQ1stywEGngsFAXnF7BIeC346+uvMT83TlfbhV+TNIFARjwx9ySNrV7hLes enTzE250yv7LaZ0tXGKhoPXfLif7nFFVNzupV1PM3uHDCjLYLRq5JQcd1IWCrBS0 IF5A/kp1X9zV8lO4fghj3aSXA7HwQphRBEJ4FkZSu34eqUX5rrC96X5T/8T9McOK iOKT/z03WI1mSBJUrU/x7N2v44mXr0kropqd/Yfqf6KQDJWW3aXkJJWxNMgBqiYS l+p3rcEBzDA=NzJu -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================== Kernel Live Patch Security Notice 0058-1 October 22, 2019

linux vulnerability

A security issue affects these releases of Ubuntu:

| Series | Base kernel | Arch | flavors | |------------------+--------------+----------+------------------| | Ubuntu 18.04 LTS | 4.15.0 | amd64 | aws | | Ubuntu 18.04 LTS | 4.15.0 | amd64 | generic | | Ubuntu 18.04 LTS | 4.15.0 | amd64 | lowlatency | | Ubuntu 18.04 LTS | 4.15.0 | amd64 | oem | | Ubuntu 18.04 LTS | 5.0.0 | amd64 | azure | | Ubuntu 14.04 LTS | 4.4.0 | amd64 | generic | | Ubuntu 14.04 LTS | 4.4.0 | amd64 | lowlatency | | Ubuntu 16.04 LTS | 4.4.0 | amd64 | aws | | Ubuntu 16.04 LTS | 4.4.0 | amd64 | generic | | Ubuntu 16.04 LTS | 4.4.0 | amd64 | lowlatency | | Ubuntu 16.04 LTS | 4.15.0 | amd64 | azure | | Ubuntu 16.04 LTS | 4.15.0 | amd64 | generic | | Ubuntu 16.04 LTS | 4.15.0 | amd64 | lowlatency |

Summary:

Several security issues were fixed in the kernel. (CVE-2016-10905)

It was discovered that a use-after-free error existed in the block layer subsystem of the Linux kernel when certain failure conditions occurred. (CVE-2018-20856)

It was discovered that the USB gadget Midi driver in the Linux kernel contained a double-free vulnerability when handling certain error conditions. (CVE-2018-20961)

It was discovered that the XFS file system in the Linux kernel did not properly handle mount failures in some situations. (CVE-2018-20976)

It was discovered that the RSI 91x Wi-Fi driver in the Linux kernel did not did not handle detach operations correctly, leading to a use-after-free vulnerability. (CVE-2018-21008)

It was discovered that the Intel Wi-Fi device driver in the Linux kernel did not properly validate certain Tunneled Direct Link Setup (TDLS). (CVE-2019-0136)

It was discovered that the Linux kernel on ARM processors allowed a tracing process to modify a syscall after a seccomp decision had been made on that syscall. (CVE-2019-2054)

It was discovered that an integer overflow existed in the Binder implementation of the Linux kernel, leading to a buffer overflow. (CVE-2019-2181)

It was discovered that the Marvell Wireless LAN device driver in the Linux kernel did not properly validate the BSS descriptor. (CVE-2019-3846)

It was discovered that a heap buffer overflow existed in the Marvell Wireless LAN device driver for the Linux kernel. (CVE-2019-10126)

It was discovered that the Bluetooth UART implementation in the Linux kernel did not properly check for missing tty operations. (CVE-2019-11478)

It was discovered that the ext4 file system implementation in the Linux kernel did not properly zero out memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-11833)

It was discovered that the PowerPC dlpar implementation in the Linux kernel did not properly check for allocation errors in some situations. (CVE-2019-12614)

It was discovered that the floppy driver in the Linux kernel did not properly validate meta data, leading to a buffer overread. (CVE-2019-14283)

It was discovered that the floppy driver in the Linux kernel did not properly validate ioctl() calls, leading to a division-by-zero. (CVE-2019-14284)

Wen Huang discovered that the Marvell Wi-Fi device driver in the Linux kernel did not properly perform bounds checking, leading to a heap overflow. (CVE-2019-14814)

Wen Huang discovered that the Marvell Wi-Fi device driver in the Linux kernel did not properly perform bounds checking, leading to a heap overflow. (CVE-2019-14815)

Wen Huang discovered that the Marvell Wi-Fi device driver in the Linux kernel did not properly perform bounds checking, leading to a heap overflow. (CVE-2019-14816)

Matt Delco discovered that the KVM hypervisor implementation in the Linux kernel did not properly perform bounds checking when handling coalesced MMIO write operations. (CVE-2019-14821)

Peter Pi discovered a buffer overflow in the virtio network backend (vhost_net) implementation in the Linux kernel. (CVE-2019-14835)

Update instructions:

The problem can be corrected by updating your livepatches to the following versions:

| Kernel | Version | flavors | |--------------------------+----------+--------------------------| | 4.4.0-148.174 | 58.1 | lowlatency, generic | | 4.4.0-148.174~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-150.176 | 58.1 | generic, lowlatency | | 4.4.0-150.176~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-151.178 | 58.1 | lowlatency, generic | | 4.4.0-151.178~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-154.181 | 58.1 | lowlatency, generic | | 4.4.0-154.181~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-157.185 | 58.1 | lowlatency, generic | | 4.4.0-157.185~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-159.187 | 58.1 | lowlatency, generic | | 4.4.0-159.187~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-161.189 | 58.1 | lowlatency, generic | | 4.4.0-161.189~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-164.192 | 58.1 | lowlatency, generic | | 4.4.0-164.192~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-165.193 | 58.1 | generic, lowlatency | | 4.4.0-1083.93 | 58.1 | aws | | 4.4.0-1084.94 | 58.1 | aws | | 4.4.0-1085.96 | 58.1 | aws | | 4.4.0-1087.98 | 58.1 | aws | | 4.4.0-1088.99 | 58.1 | aws | | 4.4.0-1090.101 | 58.1 | aws | | 4.4.0-1092.103 | 58.1 | aws | | 4.4.0-1094.105 | 58.1 | aws | | 4.15.0-50.54 | 58.1 | generic, lowlatency | | 4.15.0-50.54~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-51.55 | 58.1 | generic, lowlatency | | 4.15.0-51.55~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-52.56 | 58.1 | lowlatency, generic | | 4.15.0-52.56~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-54.58 | 58.1 | generic, lowlatency | | 4.15.0-54.58~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-55.60 | 58.1 | generic, lowlatency | | 4.15.0-58.64 | 58.1 | generic, lowlatency | | 4.15.0-58.64~16.04.1 | 58.1 | lowlatency, generic | | 4.15.0-60.67 | 58.1 | lowlatency, generic | | 4.15.0-60.67~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-62.69 | 58.1 | generic, lowlatency | | 4.15.0-62.69~16.04.1 | 58.1 | lowlatency, generic | | 4.15.0-64.73 | 58.1 | generic, lowlatency | | 4.15.0-64.73~16.04.1 | 58.1 | lowlatency, generic | | 4.15.0-65.74 | 58.1 | lowlatency, generic | | 4.15.0-1038.43 | 58.1 | oem | | 4.15.0-1039.41 | 58.1 | aws | | 4.15.0-1039.44 | 58.1 | oem | | 4.15.0-1040.42 | 58.1 | aws | | 4.15.0-1041.43 | 58.1 | aws | | 4.15.0-1043.45 | 58.1 | aws | | 4.15.0-1043.48 | 58.1 | oem | | 4.15.0-1044.46 | 58.1 | aws | | 4.15.0-1045.47 | 58.1 | aws | | 4.15.0-1045.50 | 58.1 | oem | | 4.15.0-1047.49 | 58.1 | aws | | 4.15.0-1047.51 | 58.1 | azure | | 4.15.0-1048.50 | 58.1 | aws | | 4.15.0-1049.54 | 58.1 | azure | | 4.15.0-1050.52 | 58.1 | aws | | 4.15.0-1050.55 | 58.1 | azure | | 4.15.0-1050.57 | 58.1 | oem | | 4.15.0-1051.53 | 58.1 | aws | | 4.15.0-1051.56 | 58.1 | azure | | 4.15.0-1052.57 | 58.1 | azure | | 4.15.0-1055.60 | 58.1 | azure | | 4.15.0-1056.61 | 58.1 | azure | | 4.15.0-1056.65 | 58.1 | oem | | 4.15.0-1057.62 | 58.1 | azure | | 4.15.0-1057.66 | 58.1 | oem | | 4.15.0-1059.64 | 58.1 | azure | | 5.0.0-1014.14~18.04.1 | 58.1 | azure | | 5.0.0-1016.17~18.04.1 | 58.1 | azure | | 5.0.0-1018.19~18.04.1 | 58.1 | azure | | 5.0.0-1020.21~18.04.1 | 58.1 | azure |

Support Information:

Kernels older than the levels listed below do not receive livepatch updates. Please upgrade your kernel as soon as possible.

| Series | Version | Flavors | |------------------+------------------+--------------------------| | Ubuntu 18.04 LTS | 4.15.0-1039 | aws | | Ubuntu 16.04 LTS | 4.4.0-1083 | aws | | Ubuntu 18.04 LTS | 5.0.0-1000 | azure | | Ubuntu 16.04 LTS | 4.15.0-1047 | azure | | Ubuntu 18.04 LTS | 4.15.0-50 | generic lowlatency | | Ubuntu 16.04 LTS | 4.15.0-50 | generic lowlatency | | Ubuntu 14.04 LTS | 4.4.0-148 | generic lowlatency | | Ubuntu 18.04 LTS | 4.15.0-1038 | oem | | Ubuntu 16.04 LTS | 4.4.0-148 | generic lowlatency |

References: CVE-2016-10905, CVE-2018-20856, CVE-2018-20961, CVE-2018-20976, CVE-2018-21008, CVE-2019-0136, CVE-2019-2054, CVE-2019-2181, CVE-2019-3846, CVE-2019-10126, CVE-2019-10207, CVE-2019-11477, CVE-2019-11478, CVE-2019-11833, CVE-2019-12614, CVE-2019-14283, CVE-2019-14284, CVE-2019-14814, CVE-2019-14815, CVE-2019-14816, CVE-2019-14821, CVE-2019-14835

-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce . 7) - x86_64

  1. Description:

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. 7.2) - noarch, x86_64

Bug Fix(es):

  • THP: Race between MADV_DONTNEED and NUMA hinting node migration code (BZ#1698103)

  • [RHEL7] md_clear flag missing from /proc/cpuinfo on late microcode update (BZ#1712989)

  • [RHEL7] MDS mitigations are not enabled after double microcode update (BZ#1712994)

  • WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:90 __static_key_slow_dec+0xa6/0xb0 (BZ#1713000)

Bug Fix(es):

  • kernel-rt: update to the RHEL8.0.z batch#1 source tree (BZ#1704955)

  • These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.

The following packages have been upgraded to a later upstream version: redhat-release-virtualization-host (4.3.4), redhat-virtualization-host (4.3.4)

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1176",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "big-ip local traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.0.0",
         },
         {
            model: "big-ip application acceleration manager",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "15.0.0",
         },
         {
            model: "big-ip application security manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "kernel",
            scope: "lt",
            trust: 1,
            vendor: "linux",
            version: "5.1.11",
         },
         {
            model: "big-ip application security manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "big-ip advanced firewall manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "big-ip global traffic manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip application security manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.0.0",
         },
         {
            model: "big-ip global traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.0.0",
         },
         {
            model: "big-ip analytics",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.0",
         },
         {
            model: "big-ip application acceleration manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "big-ip local traffic manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "kernel",
            scope: "lt",
            trust: 1,
            vendor: "linux",
            version: "4.9.182",
         },
         {
            model: "big-ip policy enforcement manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "big-ip edge gateway",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "big-ip application security manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "big-ip application acceleration manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip local traffic manager",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "15.0.0",
         },
         {
            model: "big-ip fraud protection service",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "big-ip global traffic manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "big-ip edge gateway",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.0.0",
         },
         {
            model: "enterprise linux atomic host",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: null,
         },
         {
            model: "big-ip global traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip access policy manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "big-ip link controller",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip application security manager",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "15.0.0",
         },
         {
            model: "big-ip link controller",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip domain name system",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip edge gateway",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "big-ip domain name system",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.0.0",
         },
         {
            model: "big-ip access policy manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip access policy manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.0.0",
         },
         {
            model: "big-ip link controller",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "big-ip domain name system",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "big-ip policy enforcement manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip advanced firewall manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "big-ip access policy manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "big-ip policy enforcement manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.0.0",
         },
         {
            model: "big-ip domain name system",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip domain name system",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "15.0.0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "big-ip fraud protection service",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip application acceleration manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "big-ip advanced firewall manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip advanced firewall manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "big-ip access policy manager",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "15.0.0",
         },
         {
            model: "big-ip fraud protection service",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.0.0",
         },
         {
            model: "big-ip global traffic manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "big-ip analytics",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip policy enforcement manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "big-ip webaccelerator",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "big-ip application security manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "16.04",
         },
         {
            model: "big-ip analytics",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.0.0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "15.0.0",
         },
         {
            model: "big-ip edge gateway",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "pulse policy secure",
            scope: "eq",
            trust: 1,
            vendor: "pulsesecure",
            version: null,
         },
         {
            model: "pulse secure virtual application delivery controller",
            scope: "eq",
            trust: 1,
            vendor: "pulsesecure",
            version: null,
         },
         {
            model: "kernel",
            scope: "gte",
            trust: 1,
            vendor: "linux",
            version: "4.20",
         },
         {
            model: "big-ip webaccelerator",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip fraud protection service",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "big-ip domain name system",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "18.10",
         },
         {
            model: "big-ip fraud protection service",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip analytics",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "big-ip domain name system",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "kernel",
            scope: "gte",
            trust: 1,
            vendor: "linux",
            version: "4.15",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "15.0.0",
         },
         {
            model: "big-ip local traffic manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip local traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "big-ip application acceleration manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.0.0",
         },
         {
            model: "big-ip access policy manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "5.0",
         },
         {
            model: "big-ip policy enforcement manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "8.0",
         },
         {
            model: "traffix signaling delivery controller",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "5.1.0",
         },
         {
            model: "big-ip local traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "big-ip global traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "big-ip webaccelerator",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "big-ip link controller",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "big-ip fraud protection service",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "big-ip application acceleration manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip local traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip global traffic manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "big-ip link controller",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "big-ip edge gateway",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "big-ip global traffic manager",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "15.0.0",
         },
         {
            model: "kernel",
            scope: "gte",
            trust: 1,
            vendor: "linux",
            version: "4.5",
         },
         {
            model: "big-ip link controller",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.0.0",
         },
         {
            model: "big-ip advanced firewall manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "15.0.0",
         },
         {
            model: "big-ip application security manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "enterprise linux eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.5",
         },
         {
            model: "big-ip edge gateway",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "big-ip analytics",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "big-ip domain name system",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "connect secure",
            scope: "eq",
            trust: 1,
            vendor: "ivanti",
            version: null,
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "15.0.0",
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "18.04",
         },
         {
            model: "big-ip edge gateway",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip domain name system",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "enterprise linux eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.4",
         },
         {
            model: "big-ip access policy manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "big-ip application acceleration manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "big-ip local traffic manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "big-ip policy enforcement manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "kernel",
            scope: "lt",
            trust: 1,
            vendor: "linux",
            version: "4.14.127",
         },
         {
            model: "big-ip access policy manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip application security manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "enterprise linux aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.5",
         },
         {
            model: "big-ip policy enforcement manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "big-ip fraud protection service",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "kernel",
            scope: "gte",
            trust: 1,
            vendor: "linux",
            version: "4.10",
         },
         {
            model: "big-ip advanced firewall manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.0.0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "14.1.0",
         },
         {
            model: "big-ip policy enforcement manager",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "15.0.0",
         },
         {
            model: "kernel",
            scope: "lt",
            trust: 1,
            vendor: "linux",
            version: "4.4.182",
         },
         {
            model: "big-ip analytics",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "big-ip webaccelerator",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "14.0.0",
         },
         {
            model: "big-ip policy enforcement manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip local traffic manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "big-ip fraud protection service",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "big-ip fraud protection service",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "15.0.0",
         },
         {
            model: "big-ip advanced firewall manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "big-ip analytics",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "12.04",
         },
         {
            model: "big-ip global traffic manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "big-ip advanced firewall manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "big-ip link controller",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "big-ip advanced firewall manager",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "15.0.0",
         },
         {
            model: "big-ip analytics",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "13.1.0",
         },
         {
            model: "kernel",
            scope: "lt",
            trust: 1,
            vendor: "linux",
            version: "4.19.52",
         },
         {
            model: "big-ip access policy manager",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "19.04",
         },
         {
            model: "big-ip edge gateway",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "traffix signaling delivery controller",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "5.0.0",
         },
         {
            model: "big-ip application acceleration manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.0",
         },
         {
            model: "enterprise mrg",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "2.0",
         },
         {
            model: "big-ip link controller",
            scope: "lte",
            trust: 1,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "big-ip application security manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "big-ip application acceleration manager",
            scope: "gte",
            trust: 1,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "14.04",
         },
         {
            model: "enterprise linux aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.6",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "arch linux",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "arista",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "check point",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "coreos",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "debian gnu linux",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "freebsd",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "red hat",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "suse linux",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "synology",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "ubuntu",
            version: null,
         },
         {
            model: "ubuntu",
            scope: null,
            trust: 0.8,
            vendor: "canonical",
            version: null,
         },
         {
            model: "big-ip access policy manager",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip advanced firewall manager",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip analytics",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip application acceleration manager",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip application security manager",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip domain name system",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip edge gateway",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip fraud protection service",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip global traffic manager",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip link controller",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip local traffic manager",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip policy enforcement manager",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "big-ip webaccelerator",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "traffix sdc",
            scope: null,
            trust: 0.8,
            vendor: "f5",
            version: null,
         },
         {
            model: "kernel",
            scope: null,
            trust: 0.8,
            vendor: "linux",
            version: null,
         },
         {
            model: "connect secure",
            scope: null,
            trust: 0.8,
            vendor: "pulse secure",
            version: null,
         },
         {
            model: "policy secure",
            scope: null,
            trust: 0.8,
            vendor: "pulse secure",
            version: null,
         },
         {
            model: "virtual application delivery controller",
            scope: null,
            trust: 0.8,
            vendor: "pulse secure",
            version: null,
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "none",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "aus",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "eus",
         },
         {
            model: "enterprise linux atomic host",
            scope: null,
            trust: 0.8,
            vendor: "red hat",
            version: null,
         },
         {
            model: "enterprise mrg",
            scope: null,
            trust: 0.8,
            vendor: "red hat",
            version: null,
         },
         {
            model: "virtualization",
            scope: null,
            trust: 0.8,
            vendor: "red hat",
            version: null,
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.2",
         },
         {
            model: "big-ip dns hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.28.4",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "email gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.6",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.3",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.18.5",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.4",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.9",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "oncommand unified manager for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "9.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.38",
         },
         {
            model: "threat intelligence exchange server",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "2.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.12",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.17.10",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.7",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.6",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.7",
         },
         {
            model: "big-ip aam hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-ip ltm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-iq centralized management",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.0",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.88",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.29.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7.3",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.1.15",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.10.13",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.13.5",
         },
         {
            model: "network threat behavior analysis appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "8.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.25.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.8.5",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0",
         },
         {
            model: "enterprise linux atomic host",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "0",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.4",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "8.0",
         },
         {
            model: "big-ip link controller hf6",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "enterprise linux server update services for sap solutions",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.9.4",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.4",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.12",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.19.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.12.3",
         },
         {
            model: "big-ip afm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-ip link controller hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.40",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.9",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.5",
         },
         {
            model: "big-ip asm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.17",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.23",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.15.8",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.15",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7.6",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.17.11",
         },
         {
            model: "e-series santricity os controller software",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "11.0",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0",
         },
         {
            model: "big-ip analytics hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.5",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.47",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.6",
         },
         {
            model: "big-ip afm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "traffix sdc",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "5.1",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.16.11",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.3",
         },
         {
            model: "big-ip analytics hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "big-ip gtm hf4",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "big-ip link controller hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.13",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "vcloud usage meter",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.21.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.34",
         },
         {
            model: "virtual storage console for vmware vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "7.2",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "big-ip asm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "enterprise linux for power little endian extended update supp",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.5",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.8",
         },
         {
            model: "big-ip afm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.11.12",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.10",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.18.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.59",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.5.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.16.36",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.8.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "secure pulse policy secure",
            scope: "eq",
            trust: 0.3,
            vendor: "pulse",
            version: "0",
         },
         {
            model: "openshift container platform",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.20.1",
         },
         {
            model: "enterprise mrg",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "2",
         },
         {
            model: "big-ip apm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.75",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.66",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.32",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.5",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.63",
         },
         {
            model: "big-ip analytics hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.17.14",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.1",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.8",
         },
         {
            model: "big-ip asm hf6",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "big-ip ltm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0.0.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.21",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "7.8",
         },
         {
            model: "big-ip apm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.24",
         },
         {
            model: "enterprise linux for ibm z systems extended update support",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.28.3",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.6",
         },
         {
            model: "big-ip aam hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "enterprise linux for real time for nfv",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "8",
         },
         {
            model: "big-ip ltm hf6",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.73",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.18",
         },
         {
            model: "big-ip link controller hf4",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "big-ip analytics build",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.40.1.256",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.1",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "big-ip aam hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.30.3",
         },
         {
            model: "enterprise pks",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0.0.3",
         },
         {
            model: "big-ip pem hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7.10",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.22",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.5",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0.0.2",
         },
         {
            model: "hci compute nodes",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.14.4",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3",
         },
         {
            model: "big-ip ltm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.9",
         },
         {
            model: "vcenter server appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "6.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.27.14",
         },
         {
            model: "big-ip link controller hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.43",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.6",
         },
         {
            model: "big-ip apm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1",
         },
         {
            model: "vasa provider for clustered data ontap",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "7.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.61",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.25",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.27.24",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.26",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.13.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.18.17",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.27",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.20.12",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.9",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.7",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.20.2",
         },
         {
            model: "big-ip pem hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "big-ip gtm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "vsphere replication",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.9.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.42",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.30",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.25.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.12.12",
         },
         {
            model: "big-ip asm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.3.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.18.9",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "15.0",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.10.11",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.15.11",
         },
         {
            model: "enterprise linux for ibm z systems extended update support",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.4",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.58",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.10.2",
         },
         {
            model: "appdefense",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.21",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.26.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.7",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.4",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.10.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.52",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.18.11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.16.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.46",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.19.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "big-ip ltm build",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.66.204.442",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.8",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.15.3",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.51",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.29",
         },
         {
            model: "integrated openstack",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.12.2",
         },
         {
            model: "big-ip afm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "xenserver ltsr cu2",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "7.1",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "big-ip afm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14.73",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.12",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.12.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.15",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.1",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.49",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.13.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.20.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.41",
         },
         {
            model: "big-ip asm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.72",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.21.6",
         },
         {
            model: "codeready linux builder for x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "8",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.1613",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.16.0-28",
         },
         {
            model: "big-ip link controller build",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.66.204.442",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.24",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.14.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.23.10",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.5",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.20.8",
         },
         {
            model: "network threat behavior analysis appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.32",
         },
         {
            model: "big-ip asm hf8",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "big-ip apm build",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.40.1.256",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.13",
         },
         {
            model: "siem enterprise security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "11.1",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.17.6",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.3",
         },
         {
            model: "big-ip aam hf6",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.5.11.5.1",
         },
         {
            model: "big-ip asm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.7",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "3.1.1",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "enterprise linux for power big endian",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.20",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.17",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.5.5",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "enterprise linux for real time",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.13.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.19",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.3",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.62",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3",
         },
         {
            model: "enterprise linux for scientific computing",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.37",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "container service extension",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.15",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.11.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7.4",
         },
         {
            model: "data exchange layer",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "5.0",
         },
         {
            model: "enterprise linux for power big endian extended update support",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.5",
         },
         {
            model: "big-ip apm hf4",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.4",
         },
         {
            model: "big-ip asm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "big-ip aam hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.18.2",
         },
         {
            model: "big-ip afm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.6",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.7",
         },
         {
            model: "big-ip link controller hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.14",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.17.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.42",
         },
         {
            model: "linux esm",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "14.04",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.48",
         },
         {
            model: "vrealize code stream",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.8",
         },
         {
            model: "threat intelligence exchange server",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "2.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.31",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.17.4",
         },
         {
            model: "big-ip pem hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "unified access gateway",
            scope: "ne",
            trust: 0.3,
            vendor: "vmware",
            version: "3.6",
         },
         {
            model: "big-ip aam hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.18.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.267",
         },
         {
            model: "big-ip gtm hf6",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.5",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0.0.3",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.6",
         },
         {
            model: "enterprise linux server tus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.2",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "big-ip ltm hf8",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.1.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.17.4",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.14.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.17",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.18.22",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.25.3",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.54",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.18",
         },
         {
            model: "big-ip aam hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.18.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.87",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "15.0",
         },
         {
            model: "big-ip link controller hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-ip gtm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.8",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.9",
         },
         {
            model: "vcenter server appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "6.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.67",
         },
         {
            model: "enterprise linux for real time",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "big-ip aam hf6",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.11",
         },
         {
            model: "big-ip ltm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.8",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6",
         },
         {
            model: "big-ip analytics hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "active iq performance analytics services",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "active response",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "2.0",
         },
         {
            model: "big-ip ltm hf4",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14-4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.20.11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.27.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.17.13",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.4",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.1",
         },
         {
            model: "big-ip aam hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.2",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.7",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0.0.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.18",
         },
         {
            model: "big-ip link controller hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.28.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.2.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.5.4",
         },
         {
            model: "big-ip pem hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.18",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.25.1",
         },
         {
            model: "big-ip gtm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "big-ip apm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.1",
         },
         {
            model: "big-ip analytics hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.44",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.27",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.11.8",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.35",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.28.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.18.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.50",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.3.3",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-6.6",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.12.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.60",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.8",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.27",
         },
         {
            model: "data exchange layer",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.0",
         },
         {
            model: "vsphere data protection",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.3",
         },
         {
            model: "storagegrid9",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "9.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.3",
         },
         {
            model: "vrealize operations manager",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "big-ip webaccelerator hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "big-ip apm hf6",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "16.04",
         },
         {
            model: "storage replication adapter for clustered data ontap for vmware",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "7.2",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.33",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.15.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.20.9",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.17.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.23.14",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.23.5",
         },
         {
            model: "big-ip analytics hf4",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1",
         },
         {
            model: "sd-wan edge by velocloud",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "enterprise linux for ibm z systems",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "big-ip afm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.2",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.1",
         },
         {
            model: "big-ip link controller hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "enterprise linux server extended update support",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.2",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.27.5",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "15.0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.23",
         },
         {
            model: "big-ip ltm build",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.40.1.256",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.24.2",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.17.9",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.6",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0.0.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.11.5",
         },
         {
            model: "vcenter server appliance 6.5u3",
            scope: "ne",
            trust: 0.3,
            vendor: "vmware",
            version: null,
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.8",
         },
         {
            model: "big-ip gtm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.10",
         },
         {
            model: "enterprise linux for power big endian extended update support",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.6",
         },
         {
            model: "big-ip link controller hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "big-ip asm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.20.15",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.22.15",
         },
         {
            model: "big-ip dns hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "openshift container platform",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "4.0",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.41",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.26",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.31",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.18",
         },
         {
            model: "big-ip dns hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "big-ip link controller build",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.40.1.256",
         },
         {
            model: "big-ip gtm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.2",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.7",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.4",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1",
         },
         {
            model: "mrg realtime",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.15.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.16.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.6",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.13",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.5",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.19",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.2",
         },
         {
            model: "horizon",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7.1",
         },
         {
            model: "enterprise linux for power big endian",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.51",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.38",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.1.8",
         },
         {
            model: "sd-wan orchestrator by velocloud",
            scope: "ne",
            trust: 0.3,
            vendor: "vmware",
            version: "3.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.23.1",
         },
         {
            model: "big-ip asm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.17.7",
         },
         {
            model: "big-iq centralized management",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "5.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.18.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.30.10",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.7",
         },
         {
            model: "enterprise linux for power big endian extended update support",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.4",
         },
         {
            model: "big-iq centralized management",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.1",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0.0.3",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.3",
         },
         {
            model: "big-ip ltm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "openshift online",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "0",
         },
         {
            model: "enterprise linux for scientific computing",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.86",
         },
         {
            model: "big-ip ltm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14.37",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14.54",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0.2",
         },
         {
            model: "big-ip apm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.8",
         },
         {
            model: "big-ip asm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-iq centralized management",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "5.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.10.3",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "enterprise linux eus compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7.4",
         },
         {
            model: "siem enterprise security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "10.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.78",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.8.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.13.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.53",
         },
         {
            model: "hypervisor",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "8.0",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "15.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.2",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.9",
         },
         {
            model: "big-ip ltm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.18.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.81",
         },
         {
            model: "big-iq centralized management",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "5.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.26.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.30.1",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.31",
         },
         {
            model: "pulse console",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "big-ip asm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.1",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.7",
         },
         {
            model: "xenserver",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "7.0",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3",
         },
         {
            model: "linux esm",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "12.04",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.11.11",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.15",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.18.1",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "big-ip pem hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.20",
         },
         {
            model: "big-ip ltm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.19",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.2",
         },
         {
            model: "big-ip afm build",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.66.204.442",
         },
         {
            model: "sd-wan orchestrator by velocloud",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.31.4",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.2",
         },
         {
            model: "big-ip afm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "big-ip pem hf4",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.6",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.8.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.18.6",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0",
         },
         {
            model: "big-ip ltm hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.30.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.17.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.13.1",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3",
         },
         {
            model: "big-ip link controller hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.26.4",
         },
         {
            model: "big-ip pem hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1",
         },
         {
            model: "big-ip gtm build",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.66.204.442",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.5",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.13.7",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.6",
         },
         {
            model: "vsphere integrated containers",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "big-ip afm hf6",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.4",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.1",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "enterprise linux for ibm z systems",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.31.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.10",
         },
         {
            model: "skyline collector",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.12",
         },
         {
            model: "big-ip analytics hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.80",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.14.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.27.46",
         },
         {
            model: "big-ip ltm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.48",
         },
         {
            model: "big-ip afm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-6.5",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0",
         },
         {
            model: "hybrid cloud extension",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "big-ip apm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "enterprise linux server extended update support",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.6",
         },
         {
            model: "big-ip pem hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.6",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.6",
         },
         {
            model: "big-ip afm hf8",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.25.4",
         },
         {
            model: "element software management node",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.5",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.2",
         },
         {
            model: "vrealize log insight",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.2",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.45",
         },
         {
            model: "big-ip apm hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.23.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.5",
         },
         {
            model: "openstack platform",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "0",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.7",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.19.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.22",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.13.11",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "big-ip ltm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "secure pulse secure vadc",
            scope: "eq",
            trust: 0.3,
            vendor: "pulse",
            version: "0",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.19.4",
         },
         {
            model: "big-ip dns hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.8",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0.0.3",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.7",
         },
         {
            model: "big-ip apm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.13",
         },
         {
            model: "element software",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.3",
         },
         {
            model: "big-ip afm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.11.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.0.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.22.16",
         },
         {
            model: "big-ip gtm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "linux lts",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "18.04",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "15.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.11",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.14",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.16.6",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.90",
         },
         {
            model: "enterprise linux for x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.2",
         },
         {
            model: "enterprise linux server update services for sap solutions",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.71",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "big-iq centralized management",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.0.1",
         },
         {
            model: "enterprise linux for power little endian extended update supp",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.6",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.23.2",
         },
         {
            model: "enterprise linux eus compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.26",
         },
         {
            model: "enterprise linux server extended update support",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.4",
         },
         {
            model: "enterprise linux server tus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.6",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "15.0",
         },
         {
            model: "big-ip aam build",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.66.204.442",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.19.1",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0.0.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.13.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.27.12",
         },
         {
            model: "enterprise linux for ibm z systems",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.28",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.11.10",
         },
         {
            model: "big-ip gtm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "big-ip analytics hf6",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.10.10",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.7",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.62",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.15.11",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.7",
         },
         {
            model: "big-ip link controller hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.4",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.20.6",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.2",
         },
         {
            model: "codeready linux builder for arm",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "648",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.9",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.11.9",
         },
         {
            model: "data loss prevention monitor",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "-11.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.24",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.82",
         },
         {
            model: "big-ip pem hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.7",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.1",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "sd-wan gateway by velocloud",
            scope: "ne",
            trust: 0.3,
            vendor: "vmware",
            version: "3.3",
         },
         {
            model: "big-ip gtm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "vcenter server appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "6.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.21",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.7",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.2",
         },
         {
            model: "big-ip pem hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.17.10",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.5",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "big-ip analytics hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0",
         },
         {
            model: "enterprise linux for power little endian extended update supp",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.1",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.11.1",
         },
         {
            model: "big-ip gtm hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "enterprise linux server tus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.23",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.2",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.13.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.64",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.7",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "15.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.93",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.15.7",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.6",
         },
         {
            model: "hci storage nodes",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.6",
         },
         {
            model: "big-ip fps hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.11.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.57",
         },
         {
            model: "big-ip ltm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14.7",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "big-ip aam hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "big-ip apm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.19",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.40",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.5",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "codeready linux builder for power little endian",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "8",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.14.2",
         },
         {
            model: "big-ip apm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "data loss prevention prevent",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "-11.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.56",
         },
         {
            model: "advanced threat defense",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "4.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.25",
         },
         {
            model: "enterprise linux for arm",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "648",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.5",
         },
         {
            model: "enterprise linux server update services for sap solutions",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.6",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.13",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.7",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.18",
         },
         {
            model: "sd-wan gateway by velocloud",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3",
         },
         {
            model: "enterprise linux server tus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.44",
         },
         {
            model: "vcloud director for service providers",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.19.3",
         },
         {
            model: "big-ip analytics hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.1",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.1",
         },
         {
            model: "big-ip aam hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.73",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.65",
         },
         {
            model: "big-ip asm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.6",
         },
         {
            model: "storagegrid webscale nas bridge",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.22",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.3113",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0.0.3",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3",
         },
         {
            model: "enterprise linux for ibm z systems extended update support",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.11.3",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.20.14",
         },
         {
            model: "big-ip analytics hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "big-ip asm build",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.66.204.442",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.15.4",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.17.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.10",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "big-ip link controller hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.9",
         },
         {
            model: "nsx for vsphere",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.21.2",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0",
         },
         {
            model: "big-ip analytics hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "big-ip link controller hf8",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.14.1",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.81",
         },
         {
            model: "openshift container platform",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "4.1",
         },
         {
            model: "big-ip afm build",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.40.1.256",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.72",
         },
         {
            model: "enterprise linux server update services for sap solutions",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.16",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.18.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.18.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.18.3",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.4",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.8",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.16",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.12.6",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3",
         },
         {
            model: "big-ip apm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.6",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.28.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.13.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.28",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.52",
         },
         {
            model: "big-ip gtm build",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.40.1.256",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.1",
         },
         {
            model: "enterprise linux server update services for sap solutions",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.2",
         },
         {
            model: "data loss prevention prevent",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "-10.0",
         },
         {
            model: "big-ip pem hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "web gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "8.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.19.2",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3",
         },
         {
            model: "big-ip analytics hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.13.3",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.16.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.17.11",
         },
         {
            model: "threat intelligence exchange server",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "2.1",
         },
         {
            model: "network data loss prevention",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.3",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3",
         },
         {
            model: "openshift dedicated",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.60",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.2",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0.0.3",
         },
         {
            model: "big-ip asm hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.19.3",
         },
         {
            model: "big-ip apm build",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.66.204.442",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.11",
         },
         {
            model: "big-ip pem hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0.0.3",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "big-ip aam hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.49",
         },
         {
            model: "big-ip pem hf",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.21",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.8.1",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.37",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.29",
         },
         {
            model: "nsx-t data center",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.11.6",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.9",
         },
         {
            model: "vrealize automation",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.22.17",
         },
         {
            model: "big-ip link controller hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.28.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.44",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.3",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.28.1",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.4",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1",
         },
         {
            model: "storagegrid",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "15.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.1",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.69",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.25.9",
         },
         {
            model: "virtualization host extended update support",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-4.2",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.7",
         },
         {
            model: "big-ip aam hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.8.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.26",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.20.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.36",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.21",
         },
         {
            model: "big-ip gtm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.315",
         },
         {
            model: "big-ip link controller hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.30.4",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.20",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "big-ip afm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.12",
         },
         {
            model: "big-ip apm hf8",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "unified access gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.43",
         },
         {
            model: "big-ip ltm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0.0.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.1",
         },
         {
            model: "big-ip aam build",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.40.1.256",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.36",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.16",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.16",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.0.0.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.13.1",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.6",
         },
         {
            model: "big-ip apm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.25.8",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.6",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.18.2",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.15.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.17",
         },
         {
            model: "big-ip pem hf6",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.13",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.31.6",
         },
         {
            model: "network security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "8.1",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.16",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.17.7",
         },
         {
            model: "virtualization host",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.17.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.20.10",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.17.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.30",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.9",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "enterprise linux for power little endian",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "8",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.3",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.15.14",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.4",
         },
         {
            model: "big-ip edge gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.18.11",
         },
         {
            model: "big-ip afm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.214",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.2.3",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.7",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "network security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.2",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.6",
         },
         {
            model: "big-ip apm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.20.13",
         },
         {
            model: "traffix sdc",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "5.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.18.12",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.34",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.15.7",
         },
         {
            model: "big-ip apm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1",
         },
         {
            model: "big-ip asm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.16.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.17",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.11.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.53",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.8",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "identity manager",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.30",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.70",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.22",
         },
         {
            model: "big-ip afm hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.45",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.3.5",
         },
         {
            model: "iworkflow",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "2.3",
         },
         {
            model: "big-ip asm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.17.2",
         },
         {
            model: "big-ip gtm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.39",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.17.1",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "big-ip aam hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.50",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.29",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "15.0",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.20.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.17",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.15",
         },
         {
            model: "big-ip aam hf7",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.76",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.29.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.22.11",
         },
         {
            model: "siem enterprise security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "10.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.15.5",
         },
         {
            model: "big-ip pem hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.36",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.17.5",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "virtualization host extended update support for rhel",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-4.27.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.31.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.1.1",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.55",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.14.3",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.5",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.8",
         },
         {
            model: "sd-wan edge by velocloud",
            scope: "ne",
            trust: 0.3,
            vendor: "vmware",
            version: "3.3",
         },
         {
            model: "big-ip asm hf4",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.20-2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.5.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.17.3",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.81",
         },
         {
            model: "enterprise linux for power little endian",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.27.13",
         },
         {
            model: "vrealize network insight",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.37",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.3.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.25.2",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "vrealize business for cloud",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.15.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.15.6",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.6",
         },
         {
            model: "big-ip asm build",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.40.1.256",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.17",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.4",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.18.16",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.72",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.12.4",
         },
         {
            model: "big-ip asm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "secure pulse connect secure",
            scope: "eq",
            trust: 0.3,
            vendor: "pulse",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.22.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.62",
         },
         {
            model: "big-ip apm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "big-iq centralized management",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "5.1",
         },
         {
            model: "big-ip pem hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.5.1",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.2",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-ip afm hf4",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.31.11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.21.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.15",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.31",
         },
         {
            model: "big-ip pem hf8",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "threat intelligence exchange server",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "2.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.0.6",
         },
         {
            model: "big-ip ltm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "15.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.16.4",
         },
         {
            model: "big-ip link controller hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.19.6",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.19.13",
         },
         {
            model: "vrealize orchestrator appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14-1",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12.14",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.21.1",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.5",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "big-ip pem hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.11.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.1",
         },
         {
            model: "vcloud availability appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.17.3",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.5.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.18",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.11",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.6",
         },
         {
            model: "big-ip aam hf8",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.10.12",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.6",
         },
         {
            model: "big-ip webaccelerator hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.18",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "8",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.2",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.12.22",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.12",
         },
         {
            model: "big-ip analytics hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.15.9",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.12",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.6",
         },
         {
            model: "virtualization",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "4",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "15.0",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "big-ip afm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3.3",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.23.3",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "xenserver",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "7.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.15.16",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "14.1",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "15.0",
         },
         {
            model: "vrealize suite lifecycle manager",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.16.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.3",
         },
         {
            model: "big-ip apm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.16.3",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.6",
         },
         {
            model: "big-ip aam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.4",
         },
         {
            model: "big-ip dns",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.2",
         },
         {
            model: "big-ip analytics hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.14",
         },
         {
            model: "big-ip analytics build",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.66.204.442",
         },
         {
            model: "big-ip aam hf4",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.10",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.5",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.4",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.2.38",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.8",
         },
         {
            model: "enterprise linux eus compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7.6",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "18.10",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.18.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.21",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.13.0",
         },
         {
            model: "horizon daas",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.23.4",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.2519",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.16",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.18.6",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-ip aam hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.2",
         },
         {
            model: "big-ip aam hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.20",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.5.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.58",
         },
         {
            model: "network security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "9.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.15",
         },
         {
            model: "big-ip gtm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.7.5",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.2",
         },
         {
            model: "big-ip afm hf2",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.1",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.60",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.15.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.15.10",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.8",
         },
         {
            model: "big-ip ltm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "virtualization extended update support for rhel",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-4.27.6",
         },
         {
            model: "big-ip apm hf1",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.2",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.3.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.10.4",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "big-ip fps",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.8",
         },
         {
            model: "big-ip gtm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.3",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.3",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.4.17",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.22.14",
         },
         {
            model: "big-ip pem",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14.3",
         },
         {
            model: "openshift on azure",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.19",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.24.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.22",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.32.14",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14.79",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.14",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.20.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.22.12",
         },
         {
            model: "big-ip asm hf3",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.4",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.11.4",
         },
         {
            model: "big-ip analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.5.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.14.45",
         },
         {
            model: "big-ip asm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "4.18.1",
         },
         {
            model: "big-ip apm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "12.1.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.22.13",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.0.98",
         },
         {
            model: "big-ip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.8",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.4",
         },
         {
            model: "big-ip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.1627",
         },
         {
            model: "big-ip afm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "13.1.0.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.6.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "3.10.10",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "19.04",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 0.3,
            vendor: "linux",
            version: "2.6.17.12",
         },
         {
            model: "siem enterprise security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "11.0",
         },
         {
            model: "big-ip ltm hf5",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "11.6.0",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#905115",
         },
         {
            db: "BID",
            id: "108798",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005618",
         },
         {
            db: "NVD",
            id: "CVE-2019-11478",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "4.4.182",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "4.9.182",
                        versionStartIncluding: "4.5",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "4.14.127",
                        versionStartIncluding: "4.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "4.19.52",
                        versionStartIncluding: "4.15",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.1.11",
                        versionStartIncluding: "4.20",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "12.1.4",
                        versionStartIncluding: "12.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.0",
                        versionStartIncluding: "14.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.1",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "11.6.4",
                        versionStartIncluding: "11.5.2",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.0",
                        versionStartIncluding: "14.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "12.1.4",
                        versionStartIncluding: "12.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.1",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "11.6.4",
                        versionStartIncluding: "11.5.2",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "12.1.4",
                        versionStartIncluding: "12.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.0",
                        versionStartIncluding: "14.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.1",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "11.6.4",
                        versionStartIncluding: "11.5.2",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "12.1.4",
                        versionStartIncluding: "12.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.0",
                        versionStartIncluding: "14.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "11.6.4",
                        versionStartIncluding: "11.5.2",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.1",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "12.1.4",
                        versionStartIncluding: "12.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.0",
                        versionStartIncluding: "14.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "11.6.4",
                        versionStartIncluding: "11.5.2",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.1",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "12.1.4",
                        versionStartIncluding: "12.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.0",
                        versionStartIncluding: "14.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "11.6.4",
                        versionStartIncluding: "11.5.2",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.1",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "12.1.4",
                        versionStartIncluding: "12.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.0",
                        versionStartIncluding: "14.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "11.6.4",
                        versionStartIncluding: "11.5.2",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.1",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "12.1.4",
                        versionStartIncluding: "12.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.0",
                        versionStartIncluding: "14.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "11.6.4",
                        versionStartIncluding: "11.5.2",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.1",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "12.1.4",
                        versionStartIncluding: "12.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.0",
                        versionStartIncluding: "14.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "11.6.4",
                        versionStartIncluding: "11.5.2",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.1",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "12.1.4",
                        versionStartIncluding: "12.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.0",
                        versionStartIncluding: "14.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "11.6.4",
                        versionStartIncluding: "11.5.2",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.1",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "12.1.4",
                        versionStartIncluding: "12.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.0",
                        versionStartIncluding: "14.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "11.6.4",
                        versionStartIncluding: "11.5.2",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.1",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "12.1.4",
                        versionStartIncluding: "12.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.0",
                        versionStartIncluding: "14.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "11.6.4",
                        versionStartIncluding: "11.5.2",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.1",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "12.1.4",
                        versionStartIncluding: "12.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "14.1.0",
                        versionStartIncluding: "14.0.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "11.6.4",
                        versionStartIncluding: "11.5.2",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.1.1",
                        versionStartIncluding: "13.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_aus:6.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_aus:6.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:enterprise_linux_atomic_host:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:pulsesecure:pulse_policy_secure:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:pulsesecure:pulse_secure_virtual_application_delivery_controller:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:ivanti:connect_secure:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "5.1.0",
                        versionStartIncluding: "5.0.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-11478",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Red Hat",
      sources: [
         {
            db: "PACKETSTORM",
            id: "153316",
         },
         {
            db: "PACKETSTORM",
            id: "153319",
         },
         {
            db: "PACKETSTORM",
            id: "153317",
         },
         {
            db: "PACKETSTORM",
            id: "153322",
         },
         {
            db: "PACKETSTORM",
            id: "153324",
         },
         {
            db: "PACKETSTORM",
            id: "153321",
         },
         {
            db: "PACKETSTORM",
            id: "153325",
         },
         {
            db: "PACKETSTORM",
            id: "153543",
         },
         {
            db: "PACKETSTORM",
            id: "153424",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2019-11478",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 5,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2019-11478",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-143128",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "security@ubuntu.com",
                  availabilityImpact: "LOW",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  impactScore: 1.4,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2019-11478",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2019-11478",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "security@ubuntu.com",
                  id: "CVE-2019-11478",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201906-682",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-143128",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-143128",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005618",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201906-682",
         },
         {
            db: "NVD",
            id: "CVE-2019-11478",
         },
         {
            db: "NVD",
            id: "CVE-2019-11478",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e. Multiple TCP Selective Acknowledgement (SACK) and Maximum Segment Size (MSS) networking vulnerabilities may cause denial-of-service conditions in Linux and FreeBSD kernels. Linux Kernel Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Linux Kernel is prone to a denial-of-service vulnerability. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n====================================================================                   \nRed Hat Security Advisory\n\nSynopsis:          Important: kernel security and bug fix update\nAdvisory ID:       RHSA-2019:1488-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2019:1488\nIssue date:        2019-06-17\nCVE Names:         CVE-2019-3896 CVE-2019-11477 CVE-2019-11478\n                   CVE-2019-11479\n====================================================================\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 6. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. While processing SACK segments, the Linux kernel's socket buffer\n(SKB) data structure becomes fragmented. Each fragment is about TCP maximum\nsegment size (MSS) bytes. To efficiently process SACK blocks, the Linux\nkernel merges multiple fragmented SKBs into one, potentially overflowing\nthe variable holding the number of segments. A remote attacker could use\nthis flaw to crash the Linux kernel by sending a crafted sequence of SACK\nsegments on a TCP connection with small value of TCP MSS, resulting in a\ndenial of service (DoS). (CVE-2019-11477)\n\n* kernel: Double free in lib/idr.c (CVE-2019-3896)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks\nallows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low\nMSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* MDS mitigations not enabled on Intel Skylake CPUs (BZ#1710081)\n\n* RHEL6 kernel does not disable SMT with mds=full,nosmt (BZ#1710121)\n\n* [RHEL6] md_clear flag missing from /proc/cpuinfo (BZ#1710517)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1694812 - CVE-2019-3896 kernel: Double free in lib/idr.c\n1719123 - CVE-2019-11477 Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service\n1719128 - CVE-2019-11478 Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service\n1719129 - CVE-2019-11479 Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nkernel-2.6.32-754.15.3.el6.src.rpm\n\ni386:\nkernel-2.6.32-754.15.3.el6.i686.rpm\nkernel-debug-2.6.32-754.15.3.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.15.3.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-754.15.3.el6.i686.rpm\nkernel-devel-2.6.32-754.15.3.el6.i686.rpm\nkernel-headers-2.6.32-754.15.3.el6.i686.rpm\nperf-2.6.32-754.15.3.el6.i686.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-754.15.3.el6.noarch.rpm\nkernel-doc-2.6.32-754.15.3.el6.noarch.rpm\nkernel-firmware-2.6.32-754.15.3.el6.noarch.rpm\n\nx86_64:\nkernel-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debug-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-754.15.3.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debuginfo-common-i686-2.6.32-754.15.3.el6.i686.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-devel-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-headers-2.6.32-754.15.3.el6.x86_64.rpm\nperf-2.6.32-754.15.3.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-754.15.3.el6.i686.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.i686.rpm\npython-perf-2.6.32-754.15.3.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.15.3.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\npython-perf-2.6.32-754.15.3.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nkernel-2.6.32-754.15.3.el6.src.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-754.15.3.el6.noarch.rpm\nkernel-doc-2.6.32-754.15.3.el6.noarch.rpm\nkernel-firmware-2.6.32-754.15.3.el6.noarch.rpm\n\nx86_64:\nkernel-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debug-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-754.15.3.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debuginfo-common-i686-2.6.32-754.15.3.el6.i686.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-devel-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-headers-2.6.32-754.15.3.el6.x86_64.rpm\nperf-2.6.32-754.15.3.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.15.3.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\npython-perf-2.6.32-754.15.3.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nkernel-2.6.32-754.15.3.el6.src.rpm\n\ni386:\nkernel-2.6.32-754.15.3.el6.i686.rpm\nkernel-debug-2.6.32-754.15.3.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.15.3.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-754.15.3.el6.i686.rpm\nkernel-devel-2.6.32-754.15.3.el6.i686.rpm\nkernel-headers-2.6.32-754.15.3.el6.i686.rpm\nperf-2.6.32-754.15.3.el6.i686.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-754.15.3.el6.noarch.rpm\nkernel-doc-2.6.32-754.15.3.el6.noarch.rpm\nkernel-firmware-2.6.32-754.15.3.el6.noarch.rpm\n\nppc64:\nkernel-2.6.32-754.15.3.el6.ppc64.rpm\nkernel-bootwrapper-2.6.32-754.15.3.el6.ppc64.rpm\nkernel-debug-2.6.32-754.15.3.el6.ppc64.rpm\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.ppc64.rpm\nkernel-debug-devel-2.6.32-754.15.3.el6.ppc64.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.ppc64.rpm\nkernel-debuginfo-common-ppc64-2.6.32-754.15.3.el6.ppc64.rpm\nkernel-devel-2.6.32-754.15.3.el6.ppc64.rpm\nkernel-headers-2.6.32-754.15.3.el6.ppc64.rpm\nperf-2.6.32-754.15.3.el6.ppc64.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.ppc64.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.ppc64.rpm\n\ns390x:\nkernel-2.6.32-754.15.3.el6.s390x.rpm\nkernel-debug-2.6.32-754.15.3.el6.s390x.rpm\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.s390x.rpm\nkernel-debug-devel-2.6.32-754.15.3.el6.s390x.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.s390x.rpm\nkernel-debuginfo-common-s390x-2.6.32-754.15.3.el6.s390x.rpm\nkernel-devel-2.6.32-754.15.3.el6.s390x.rpm\nkernel-headers-2.6.32-754.15.3.el6.s390x.rpm\nkernel-kdump-2.6.32-754.15.3.el6.s390x.rpm\nkernel-kdump-debuginfo-2.6.32-754.15.3.el6.s390x.rpm\nkernel-kdump-devel-2.6.32-754.15.3.el6.s390x.rpm\nperf-2.6.32-754.15.3.el6.s390x.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.s390x.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.s390x.rpm\n\nx86_64:\nkernel-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debug-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-754.15.3.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debuginfo-common-i686-2.6.32-754.15.3.el6.i686.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-devel-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-headers-2.6.32-754.15.3.el6.x86_64.rpm\nperf-2.6.32-754.15.3.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-754.15.3.el6.i686.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.i686.rpm\npython-perf-2.6.32-754.15.3.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm\n\nppc64:\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.ppc64.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.ppc64.rpm\nkernel-debuginfo-common-ppc64-2.6.32-754.15.3.el6.ppc64.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.ppc64.rpm\npython-perf-2.6.32-754.15.3.el6.ppc64.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.ppc64.rpm\n\ns390x:\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.s390x.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.s390x.rpm\nkernel-debuginfo-common-s390x-2.6.32-754.15.3.el6.s390x.rpm\nkernel-kdump-debuginfo-2.6.32-754.15.3.el6.s390x.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.s390x.rpm\npython-perf-2.6.32-754.15.3.el6.s390x.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.s390x.rpm\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.15.3.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\npython-perf-2.6.32-754.15.3.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nkernel-2.6.32-754.15.3.el6.src.rpm\n\ni386:\nkernel-2.6.32-754.15.3.el6.i686.rpm\nkernel-debug-2.6.32-754.15.3.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.15.3.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-754.15.3.el6.i686.rpm\nkernel-devel-2.6.32-754.15.3.el6.i686.rpm\nkernel-headers-2.6.32-754.15.3.el6.i686.rpm\nperf-2.6.32-754.15.3.el6.i686.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-754.15.3.el6.noarch.rpm\nkernel-doc-2.6.32-754.15.3.el6.noarch.rpm\nkernel-firmware-2.6.32-754.15.3.el6.noarch.rpm\n\nx86_64:\nkernel-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debug-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-754.15.3.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debuginfo-common-i686-2.6.32-754.15.3.el6.i686.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-devel-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-headers-2.6.32-754.15.3.el6.x86_64.rpm\nperf-2.6.32-754.15.3.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-754.15.3.el6.i686.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.i686.rpm\npython-perf-2.6.32-754.15.3.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.i686.rpm\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.15.3.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\npython-perf-2.6.32-754.15.3.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.15.3.el6.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2019-3896\nhttps://access.redhat.com/security/cve/CVE-2019-11477\nhttps://access.redhat.com/security/cve/CVE-2019-11478\nhttps://access.redhat.com/security/cve/CVE-2019-11479\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/tcpsack\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2019 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nl+p3rcEBzDA=NzJu\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. ==========================================================================\nKernel Live Patch Security Notice 0058-1\nOctober 22, 2019\n\nlinux vulnerability\n==========================================================================\n\nA security issue affects these releases of Ubuntu:\n\n| Series           | Base kernel  | Arch     | flavors          |\n|------------------+--------------+----------+------------------|\n| Ubuntu 18.04 LTS | 4.15.0       | amd64    | aws              |\n| Ubuntu 18.04 LTS | 4.15.0       | amd64    | generic          |\n| Ubuntu 18.04 LTS | 4.15.0       | amd64    | lowlatency       |\n| Ubuntu 18.04 LTS | 4.15.0       | amd64    | oem              |\n| Ubuntu 18.04 LTS | 5.0.0        | amd64    | azure            |\n| Ubuntu 14.04 LTS | 4.4.0        | amd64    | generic          |\n| Ubuntu 14.04 LTS | 4.4.0        | amd64    | lowlatency       |\n| Ubuntu 16.04 LTS | 4.4.0        | amd64    | aws              |\n| Ubuntu 16.04 LTS | 4.4.0        | amd64    | generic          |\n| Ubuntu 16.04 LTS | 4.4.0        | amd64    | lowlatency       |\n| Ubuntu 16.04 LTS | 4.15.0       | amd64    | azure            |\n| Ubuntu 16.04 LTS | 4.15.0       | amd64    | generic          |\n| Ubuntu 16.04 LTS | 4.15.0       | amd64    | lowlatency       |\n\nSummary:\n\nSeveral security issues were fixed in the kernel. (CVE-2016-10905)\n\nIt was discovered that a use-after-free error existed in the block layer\nsubsystem of the Linux kernel when certain failure conditions occurred. (CVE-2018-20856)\n\nIt was discovered that the USB gadget Midi driver in the Linux kernel\ncontained a double-free vulnerability when handling certain error\nconditions. (CVE-2018-20961)\n\nIt was discovered that the XFS file system in the Linux kernel did not\nproperly handle mount failures in some situations. (CVE-2018-20976)\n\nIt was discovered that the RSI 91x Wi-Fi driver in the Linux kernel did not\ndid not handle detach operations correctly, leading to a use-after-free\nvulnerability. \n(CVE-2018-21008)\n\nIt was discovered that the Intel Wi-Fi device driver in the Linux kernel\ndid not properly validate certain Tunneled Direct Link Setup (TDLS). (CVE-2019-0136)\n\nIt was discovered that the Linux kernel on ARM processors allowed a tracing\nprocess to modify a syscall after a seccomp decision had been made on that\nsyscall. (CVE-2019-2054)\n\nIt was discovered that an integer overflow existed in the Binder\nimplementation of the Linux kernel, leading to a buffer overflow. (CVE-2019-2181)\n\nIt was discovered that the Marvell Wireless LAN device driver in the Linux\nkernel did not properly validate the BSS descriptor. (CVE-2019-3846)\n\nIt was discovered that a heap buffer overflow existed in the Marvell\nWireless LAN device driver for the Linux kernel. (CVE-2019-10126)\n\nIt was discovered that the Bluetooth UART implementation in the Linux\nkernel did not properly check for missing tty operations. (CVE-2019-11478)\n\nIt was discovered that the ext4 file system implementation in the Linux\nkernel did not properly zero out memory in some situations. A local\nattacker could use this to expose sensitive information (kernel memory). \n(CVE-2019-11833)\n\nIt was discovered that the PowerPC dlpar implementation in the Linux kernel\ndid not properly check for allocation errors in some situations. (CVE-2019-12614)\n\nIt was discovered that the floppy driver in the Linux kernel did not\nproperly validate meta data, leading to a buffer overread. \n(CVE-2019-14283)\n\nIt was discovered that the floppy driver in the Linux kernel did not\nproperly validate ioctl() calls, leading to a division-by-zero. \n(CVE-2019-14284)\n\nWen Huang discovered that the Marvell Wi-Fi device driver in the Linux\nkernel did not properly perform bounds checking, leading to a heap\noverflow. (CVE-2019-14814)\n\nWen Huang discovered that the Marvell Wi-Fi device driver in the Linux\nkernel did not properly perform bounds checking, leading to a heap\noverflow. (CVE-2019-14815)\n\nWen Huang discovered that the Marvell Wi-Fi device driver in the Linux\nkernel did not properly perform bounds checking, leading to a heap\noverflow. (CVE-2019-14816)\n\nMatt Delco discovered that the KVM hypervisor implementation in the Linux\nkernel did not properly perform bounds checking when handling coalesced\nMMIO write operations. (CVE-2019-14821)\n\nPeter Pi discovered a buffer overflow in the virtio network backend\n(vhost_net) implementation in the Linux kernel. (CVE-2019-14835)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your livepatches to the following\nversions:\n\n| Kernel                   | Version  | flavors                  |\n|--------------------------+----------+--------------------------|\n| 4.4.0-148.174            | 58.1     | lowlatency, generic      |\n| 4.4.0-148.174~14.04.1    | 58.1     | lowlatency, generic      |\n| 4.4.0-150.176            | 58.1     | generic, lowlatency      |\n| 4.4.0-150.176~14.04.1    | 58.1     | lowlatency, generic      |\n| 4.4.0-151.178            | 58.1     | lowlatency, generic      |\n| 4.4.0-151.178~14.04.1    | 58.1     | generic, lowlatency      |\n| 4.4.0-154.181            | 58.1     | lowlatency, generic      |\n| 4.4.0-154.181~14.04.1    | 58.1     | generic, lowlatency      |\n| 4.4.0-157.185            | 58.1     | lowlatency, generic      |\n| 4.4.0-157.185~14.04.1    | 58.1     | generic, lowlatency      |\n| 4.4.0-159.187            | 58.1     | lowlatency, generic      |\n| 4.4.0-159.187~14.04.1    | 58.1     | generic, lowlatency      |\n| 4.4.0-161.189            | 58.1     | lowlatency, generic      |\n| 4.4.0-161.189~14.04.1    | 58.1     | lowlatency, generic      |\n| 4.4.0-164.192            | 58.1     | lowlatency, generic      |\n| 4.4.0-164.192~14.04.1    | 58.1     | lowlatency, generic      |\n| 4.4.0-165.193            | 58.1     | generic, lowlatency      |\n| 4.4.0-1083.93            | 58.1     | aws                      |\n| 4.4.0-1084.94            | 58.1     | aws                      |\n| 4.4.0-1085.96            | 58.1     | aws                      |\n| 4.4.0-1087.98            | 58.1     | aws                      |\n| 4.4.0-1088.99            | 58.1     | aws                      |\n| 4.4.0-1090.101           | 58.1     | aws                      |\n| 4.4.0-1092.103           | 58.1     | aws                      |\n| 4.4.0-1094.105           | 58.1     | aws                      |\n| 4.15.0-50.54             | 58.1     | generic, lowlatency      |\n| 4.15.0-50.54~16.04.1     | 58.1     | generic, lowlatency      |\n| 4.15.0-51.55             | 58.1     | generic, lowlatency      |\n| 4.15.0-51.55~16.04.1     | 58.1     | generic, lowlatency      |\n| 4.15.0-52.56             | 58.1     | lowlatency, generic      |\n| 4.15.0-52.56~16.04.1     | 58.1     | generic, lowlatency      |\n| 4.15.0-54.58             | 58.1     | generic, lowlatency      |\n| 4.15.0-54.58~16.04.1     | 58.1     | generic, lowlatency      |\n| 4.15.0-55.60             | 58.1     | generic, lowlatency      |\n| 4.15.0-58.64             | 58.1     | generic, lowlatency      |\n| 4.15.0-58.64~16.04.1     | 58.1     | lowlatency, generic      |\n| 4.15.0-60.67             | 58.1     | lowlatency, generic      |\n| 4.15.0-60.67~16.04.1     | 58.1     | generic, lowlatency      |\n| 4.15.0-62.69             | 58.1     | generic, lowlatency      |\n| 4.15.0-62.69~16.04.1     | 58.1     | lowlatency, generic      |\n| 4.15.0-64.73             | 58.1     | generic, lowlatency      |\n| 4.15.0-64.73~16.04.1     | 58.1     | lowlatency, generic      |\n| 4.15.0-65.74             | 58.1     | lowlatency, generic      |\n| 4.15.0-1038.43           | 58.1     | oem                      |\n| 4.15.0-1039.41           | 58.1     | aws                      |\n| 4.15.0-1039.44           | 58.1     | oem                      |\n| 4.15.0-1040.42           | 58.1     | aws                      |\n| 4.15.0-1041.43           | 58.1     | aws                      |\n| 4.15.0-1043.45           | 58.1     | aws                      |\n| 4.15.0-1043.48           | 58.1     | oem                      |\n| 4.15.0-1044.46           | 58.1     | aws                      |\n| 4.15.0-1045.47           | 58.1     | aws                      |\n| 4.15.0-1045.50           | 58.1     | oem                      |\n| 4.15.0-1047.49           | 58.1     | aws                      |\n| 4.15.0-1047.51           | 58.1     | azure                    |\n| 4.15.0-1048.50           | 58.1     | aws                      |\n| 4.15.0-1049.54           | 58.1     | azure                    |\n| 4.15.0-1050.52           | 58.1     | aws                      |\n| 4.15.0-1050.55           | 58.1     | azure                    |\n| 4.15.0-1050.57           | 58.1     | oem                      |\n| 4.15.0-1051.53           | 58.1     | aws                      |\n| 4.15.0-1051.56           | 58.1     | azure                    |\n| 4.15.0-1052.57           | 58.1     | azure                    |\n| 4.15.0-1055.60           | 58.1     | azure                    |\n| 4.15.0-1056.61           | 58.1     | azure                    |\n| 4.15.0-1056.65           | 58.1     | oem                      |\n| 4.15.0-1057.62           | 58.1     | azure                    |\n| 4.15.0-1057.66           | 58.1     | oem                      |\n| 4.15.0-1059.64           | 58.1     | azure                    |\n| 5.0.0-1014.14~18.04.1    | 58.1     | azure                    |\n| 5.0.0-1016.17~18.04.1    | 58.1     | azure                    |\n| 5.0.0-1018.19~18.04.1    | 58.1     | azure                    |\n| 5.0.0-1020.21~18.04.1    | 58.1     | azure                    |\n\nSupport Information:\n\nKernels older than the levels listed below do not receive livepatch\nupdates. Please upgrade your kernel as soon as possible. \n\n| Series           | Version          | Flavors                  |\n|------------------+------------------+--------------------------|\n| Ubuntu 18.04 LTS | 4.15.0-1039      | aws                      |\n| Ubuntu 16.04 LTS | 4.4.0-1083       | aws                      |\n| Ubuntu 18.04 LTS | 5.0.0-1000       | azure                    |\n| Ubuntu 16.04 LTS | 4.15.0-1047      | azure                    |\n| Ubuntu 18.04 LTS | 4.15.0-50        | generic lowlatency       |\n| Ubuntu 16.04 LTS | 4.15.0-50        | generic lowlatency       |\n| Ubuntu 14.04 LTS | 4.4.0-148        | generic lowlatency       |\n| Ubuntu 18.04 LTS | 4.15.0-1038      | oem                      |\n| Ubuntu 16.04 LTS | 4.4.0-148        | generic lowlatency       |\n\nReferences:\n  CVE-2016-10905, CVE-2018-20856, CVE-2018-20961, CVE-2018-20976, \n  CVE-2018-21008, CVE-2019-0136, CVE-2019-2054, CVE-2019-2181, \n  CVE-2019-3846, CVE-2019-10126, CVE-2019-10207, CVE-2019-11477, \n  CVE-2019-11478, CVE-2019-11833, CVE-2019-12614, CVE-2019-14283, \n  CVE-2019-14284, CVE-2019-14814, CVE-2019-14815, CVE-2019-14816, \n  CVE-2019-14821, CVE-2019-14835\n\n\n-- \nubuntu-security-announce mailing list\nubuntu-security-announce@lists.ubuntu.com\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\n. 7) - x86_64\n\n3. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. 7.2) - noarch, x86_64\n\n3. \n\nBug Fix(es):\n\n* THP: Race between MADV_DONTNEED and NUMA hinting node migration code\n(BZ#1698103)\n\n* [RHEL7] md_clear flag missing from /proc/cpuinfo on late microcode update\n(BZ#1712989)\n\n* [RHEL7] MDS mitigations are not enabled after double microcode update\n(BZ#1712994)\n\n* WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:90\n__static_key_slow_dec+0xa6/0xb0 (BZ#1713000)\n\n4. \n\nBug Fix(es):\n\n* kernel-rt: update to the RHEL8.0.z batch#1 source tree (BZ#1704955)\n\n4. These packages include redhat-release-virtualization-host,\novirt-node, and rhev-hypervisor. RHVH features a Cockpit user\ninterface for monitoring the host's resources and performing administrative\ntasks. \n\nThe following packages have been upgraded to a later upstream version:\nredhat-release-virtualization-host (4.3.4), redhat-virtualization-host\n(4.3.4)",
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-11478",
         },
         {
            db: "CERT/CC",
            id: "VU#905115",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005618",
         },
         {
            db: "BID",
            id: "108798",
         },
         {
            db: "VULHUB",
            id: "VHN-143128",
         },
         {
            db: "PACKETSTORM",
            id: "153316",
         },
         {
            db: "PACKETSTORM",
            id: "153319",
         },
         {
            db: "PACKETSTORM",
            id: "154951",
         },
         {
            db: "PACKETSTORM",
            id: "153317",
         },
         {
            db: "PACKETSTORM",
            id: "153322",
         },
         {
            db: "PACKETSTORM",
            id: "153324",
         },
         {
            db: "PACKETSTORM",
            id: "153321",
         },
         {
            db: "PACKETSTORM",
            id: "153325",
         },
         {
            db: "PACKETSTORM",
            id: "153543",
         },
         {
            db: "PACKETSTORM",
            id: "153424",
         },
      ],
      trust: 3.6,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2019-11478",
            trust: 4.6,
         },
         {
            db: "CERT/CC",
            id: "VU#905115",
            trust: 3.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-19-253-03",
            trust: 2.5,
         },
         {
            db: "PULSESECURE",
            id: "SA44193",
            trust: 2,
         },
         {
            db: "MCAFEE",
            id: "SB10287",
            trust: 2,
         },
         {
            db: "PACKETSTORM",
            id: "154951",
            trust: 1.8,
         },
         {
            db: "PACKETSTORM",
            id: "153346",
            trust: 1.7,
         },
         {
            db: "PACKETSTORM",
            id: "154408",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-462066",
            trust: 1.7,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2019/06/28/2",
            trust: 1.7,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2019/10/29/3",
            trust: 1.7,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2019/10/24/1",
            trust: 1.7,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2019/07/06/4",
            trust: 1.7,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2019/07/06/3",
            trust: 1.7,
         },
         {
            db: "BID",
            id: "108798",
            trust: 1,
         },
         {
            db: "JVN",
            id: "JVNVU93800789",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005618",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201906-682",
            trust: 0.7,
         },
         {
            db: "PACKETSTORM",
            id: "153329",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.3564",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.4528",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.4255",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.2171",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.0736",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.2155",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.0342",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.2231",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ASB-2019.0178.3",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.4316",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-29592",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-143128",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "153316",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "153319",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "153317",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "153322",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "153324",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "153321",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "153325",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "153543",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "153424",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#905115",
         },
         {
            db: "VULHUB",
            id: "VHN-143128",
         },
         {
            db: "BID",
            id: "108798",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005618",
         },
         {
            db: "PACKETSTORM",
            id: "153316",
         },
         {
            db: "PACKETSTORM",
            id: "153319",
         },
         {
            db: "PACKETSTORM",
            id: "154951",
         },
         {
            db: "PACKETSTORM",
            id: "153317",
         },
         {
            db: "PACKETSTORM",
            id: "153322",
         },
         {
            db: "PACKETSTORM",
            id: "153324",
         },
         {
            db: "PACKETSTORM",
            id: "153321",
         },
         {
            db: "PACKETSTORM",
            id: "153325",
         },
         {
            db: "PACKETSTORM",
            id: "153543",
         },
         {
            db: "PACKETSTORM",
            id: "153424",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201906-682",
         },
         {
            db: "NVD",
            id: "CVE-2019-11478",
         },
      ],
   },
   id: "VAR-201906-1176",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-143128",
         },
      ],
      trust: 0.5256111242857142,
   },
   last_update_date: "2024-07-23T21:31:12.688000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Linux Kernel Archives",
            trust: 0.8,
            url: "https://www.kernel.org/",
         },
         {
            title: "tcp: tcp_fragment() should apply sane memory limits",
            trust: 0.8,
            url: "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=f070ef2ac66716357066b683fb0baf55f8191a2e",
         },
         {
            title: "TCP SACK PANIC - Kernel vulnerabilities - CVE-2019-11477, CVE-2019-11478 & CVE-2019-11479",
            trust: 0.8,
            url: "https://access.redhat.com/security/vulnerabilities/tcpsack",
         },
         {
            title: "SA44193",
            trust: 0.8,
            url: "https://kb.pulsesecure.net/articles/pulse_security_advisories/sa44193",
         },
         {
            title: "K26618426",
            trust: 0.8,
            url: "https://support.f5.com/csp/article/k26618426",
         },
         {
            title: "SACK Panic and Other TCP Denial of Service Issues",
            trust: 0.8,
            url: "https://wiki.ubuntu.com/securityteam/knowledgebase/sackpanic",
         },
         {
            title: "Linux kernel Remediation of resource management error vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=93876",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2019-005618",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201906-682",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-400",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-143128",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005618",
         },
         {
            db: "NVD",
            id: "CVE-2019-11478",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 4.4,
            url: "https://access.redhat.com/security/vulnerabilities/tcpsack",
         },
         {
            trust: 3.6,
            url: "https://github.com/netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md",
         },
         {
            trust: 3.1,
            url: "https://www.us-cert.gov/ics/advisories/icsa-19-253-03",
         },
         {
            trust: 2.5,
            url: "https://www.synology.com/security/advisory/synology_sa_19_28",
         },
         {
            trust: 2.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-11478",
         },
         {
            trust: 2.3,
            url: "http://packetstormsecurity.com/files/153346/kernel-live-patch-security-notice-lsn-0052-1.html",
         },
         {
            trust: 2.1,
            url: "https://access.redhat.com/errata/rhsa-2019:1594",
         },
         {
            trust: 2,
            url: "http://www.vmware.com/security/advisories/vmsa-2019-0010.html",
         },
         {
            trust: 2,
            url: "https://kb.pulsesecure.net/articles/pulse_security_advisories/sa44193",
         },
         {
            trust: 2,
            url: "https://security.netapp.com/advisory/ntap-20190625-0001/",
         },
         {
            trust: 2,
            url: "https://support.f5.com/csp/article/k26618426",
         },
         {
            trust: 2,
            url: "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=f070ef2ac66716357066b683fb0baf55f8191a2e",
         },
         {
            trust: 2,
            url: "https://wiki.ubuntu.com/securityteam/knowledgebase/sackpanic",
         },
         {
            trust: 2,
            url: "https://access.redhat.com/errata/rhsa-2019:1602",
         },
         {
            trust: 1.9,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10287",
         },
         {
            trust: 1.8,
            url: "https://access.redhat.com/errata/rhsa-2019:1699",
         },
         {
            trust: 1.8,
            url: "https://access.redhat.com/security/cve/cve-2019-11478",
         },
         {
            trust: 1.7,
            url: "https://seclists.org/bugtraq/2019/jul/30",
         },
         {
            trust: 1.7,
            url: "https://www.kb.cert.org/vuls/id/905115",
         },
         {
            trust: 1.7,
            url: "http://www.arubanetworks.com/assets/alert/aruba-psa-2020-010.txt",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf",
         },
         {
            trust: 1.7,
            url: "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2019-0007",
         },
         {
            trust: 1.7,
            url: "http://packetstormsecurity.com/files/154408/kernel-live-patch-security-notice-lsn-0055-1.html",
         },
         {
            trust: 1.7,
            url: "http://packetstormsecurity.com/files/154951/kernel-live-patch-security-notice-lsn-0058-1.html",
         },
         {
            trust: 1.7,
            url: "https://www.oracle.com/security-alerts/cpujan2020.html",
         },
         {
            trust: 1.7,
            url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
         },
         {
            trust: 1.7,
            url: "http://www.openwall.com/lists/oss-security/2019/06/28/2",
         },
         {
            trust: 1.7,
            url: "http://www.openwall.com/lists/oss-security/2019/07/06/3",
         },
         {
            trust: 1.7,
            url: "http://www.openwall.com/lists/oss-security/2019/07/06/4",
         },
         {
            trust: 1.7,
            url: "http://www.openwall.com/lists/oss-security/2019/10/24/1",
         },
         {
            trust: 1.7,
            url: "http://www.openwall.com/lists/oss-security/2019/10/29/3",
         },
         {
            trust: 1.6,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11478",
         },
         {
            trust: 1,
            url: "https://access.redhat.com/errata/rhsa-2019:1480",
         },
         {
            trust: 1,
            url: "https://access.redhat.com/errata/rhsa-2019:1481",
         },
         {
            trust: 1,
            url: "https://access.redhat.com/errata/rhsa-2019:1483",
         },
         {
            trust: 1,
            url: "https://access.redhat.com/errata/rhsa-2019:1485",
         },
         {
            trust: 1,
            url: "https://access.redhat.com/errata/rhsa-2019:1486",
         },
         {
            trust: 1,
            url: "https://access.redhat.com/errata/rhsa-2019:1488",
         },
         {
            trust: 1,
            url: "https://access.redhat.com/errata/rhsa-2019:1490",
         },
         {
            trust: 1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-11477",
         },
         {
            trust: 0.9,
            url: "http://www.kernel.org/",
         },
         {
            trust: 0.9,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1719128",
         },
         {
            trust: 0.9,
            url: "https://support.citrix.com/article/ctx256725",
         },
         {
            trust: 0.9,
            url: "https://access.redhat.com/errata/rhsa-2019:1479",
         },
         {
            trust: 0.9,
            url: "https://access.redhat.com/errata/rhsa-2019:1482",
         },
         {
            trust: 0.9,
            url: "https://access.redhat.com/errata/rhsa-2019:1484",
         },
         {
            trust: 0.9,
            url: "https://access.redhat.com/errata/rhsa-2019:1487",
         },
         {
            trust: 0.9,
            url: "https://access.redhat.com/errata/rhsa-2019:1489",
         },
         {
            trust: 0.9,
            url: "https://usn.ubuntu.com/4017-1",
         },
         {
            trust: 0.9,
            url: "https://usn.ubuntu.com/4017-2",
         },
         {
            trust: 0.9,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.9,
            url: "https://access.redhat.com/security/cve/cve-2019-11477",
         },
         {
            trust: 0.9,
            url: "https://access.redhat.com/security/cve/cve-2019-11479",
         },
         {
            trust: 0.9,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.9,
            url: "https://access.redhat.com/security/team/key/",
         },
         {
            trust: 0.9,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-11479",
         },
         {
            trust: 0.9,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.9,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11477",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11479",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-5599",
         },
         {
            trust: 0.8,
            url: "https://security.archlinux.org/cve-2019-11477https://security.archlinux.org/cve-2019-11478https://security.archlinux.org/cve-2019-11479",
         },
         {
            trust: 0.8,
            url: "https://www.arista.com/en/support/advisories-notices/security-advisories/8066-security-advisory-41",
         },
         {
            trust: 0.8,
            url: "https://coreos.com/releases/",
         },
         {
            trust: 0.8,
            url: "https://security-tracker.debian.org/tracker/cve-2019-11477https://security-tracker.debian.org/tracker/cve-2019-11478https://security-tracker.debian.org/tracker/cve-2019-11479",
         },
         {
            trust: 0.8,
            url: "https://www.suse.com/c/suse-addresses-the-sack-panic-tcp-remote-denial-of-service-attacks/https://www.suse.com/support/kb/doc/?id=7023928",
         },
         {
            trust: 0.8,
            url: "https://usn.ubuntu.com/4017-1/https://usn.ubuntu.com/4017-2/",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu93800789/",
         },
         {
            trust: 0.8,
            url: "https://www.kb.cert.org/vuls/id/905115/",
         },
         {
            trust: 0.7,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20191530-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20191529-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20191532-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20191536-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.ibm.com/support/pages/node/1284766",
         },
         {
            trust: 0.6,
            url: "https://www.ibm.com/support/pages/node/1284760",
         },
         {
            trust: 0.6,
            url: "https://www.ibm.com/support/pages/node/1284772",
         },
         {
            trust: 0.6,
            url: "https://www.ibm.com/support/pages/node/1284778",
         },
         {
            trust: 0.6,
            url: "https://www.ibm.com/support/pages/node/1284784",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20191550-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20191535-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20191534-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20191533-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20191527-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-201914089-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20191581-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20191588-1.html",
         },
         {
            trust: 0.6,
            url: "https://fortiguard.com/psirt/fg-ir-19-180",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/linux-kernel-denial-of-service-via-tcp-sack-fragmented-retransmission-queue-29544",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2019.4528/",
         },
         {
            trust: 0.6,
            url: "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-have-been-identified-in-openssl-and-the-kernel-shipped-with-the-ds8000-hardware-management-console-hmc/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2019.4316/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.0736/",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-29592",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/153329/linux-freebsd-tcp-based-denial-of-service.html",
         },
         {
            trust: 0.6,
            url: "https://www.ibm.com/support/pages/node/1137796",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.4255/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2019.2231/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2019.2155/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2019.2171/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/asb-2019.0178.3/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.0342/",
         },
         {
            trust: 0.6,
            url: "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-has-announced-a-release-for-ibm-security-identity-governance-and-intelligence-in-response-to-security-vulnerability-cve-2019-11479-cve-2019-11478-cve-2019-11477/",
         },
         {
            trust: 0.6,
            url: "https://www.ibm.com/support/pages/node/3517185",
         },
         {
            trust: 0.6,
            url: "https://www.ibm.com/support/pages/node/1164286",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-19-253-03",
         },
         {
            trust: 0.6,
            url: "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-integrated-management-module-ii-imm2-is-affected-by-vulnerabilities-in-tcp-cve-2019-11477-cve-2019-11478-cve-2019-11479/",
         },
         {
            trust: 0.6,
            url: "https://www.securityfocus.com/bid/108798",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.3564/",
         },
         {
            trust: 0.6,
            url: "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-bootable-media-creator-bomc-is-affected-by-vulnerabilities-in-the-kernel/",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2019-3896",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-3896",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/articles/2974891",
         },
         {
            trust: 0.1,
            url: "https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10287",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-7566",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-1000004",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-7566",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-1000004",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-14815",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-20856",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-2181",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-10207",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-14821",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-14835",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-3846",
         },
         {
            trust: 0.1,
            url: "https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-10905",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-14816",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-12614",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-21008",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-10126",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-14284",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-14283",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-11833",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-2054",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-20976",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-0136",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-14814",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-20961",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-9213",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-9213",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-10167",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-10166",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-10166",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-10168",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-10161",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-10168",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-10161",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-10167",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#905115",
         },
         {
            db: "VULHUB",
            id: "VHN-143128",
         },
         {
            db: "BID",
            id: "108798",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005618",
         },
         {
            db: "PACKETSTORM",
            id: "153316",
         },
         {
            db: "PACKETSTORM",
            id: "153319",
         },
         {
            db: "PACKETSTORM",
            id: "154951",
         },
         {
            db: "PACKETSTORM",
            id: "153317",
         },
         {
            db: "PACKETSTORM",
            id: "153322",
         },
         {
            db: "PACKETSTORM",
            id: "153324",
         },
         {
            db: "PACKETSTORM",
            id: "153321",
         },
         {
            db: "PACKETSTORM",
            id: "153325",
         },
         {
            db: "PACKETSTORM",
            id: "153543",
         },
         {
            db: "PACKETSTORM",
            id: "153424",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201906-682",
         },
         {
            db: "NVD",
            id: "CVE-2019-11478",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#905115",
         },
         {
            db: "VULHUB",
            id: "VHN-143128",
         },
         {
            db: "BID",
            id: "108798",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-005618",
         },
         {
            db: "PACKETSTORM",
            id: "153316",
         },
         {
            db: "PACKETSTORM",
            id: "153319",
         },
         {
            db: "PACKETSTORM",
            id: "154951",
         },
         {
            db: "PACKETSTORM",
            id: "153317",
         },
         {
            db: "PACKETSTORM",
            id: "153322",
         },
         {
            db: "PACKETSTORM",
            id: "153324",
         },
         {
            db: "PACKETSTORM",
            id: "153321",
         },
         {
            db: "PACKETSTORM",
            id: "153325",
         },
         {
            db: "PACKETSTORM",
            id: "153543",
         },
         {
            db: "PACKETSTORM",
            id: "153424",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201906-682",
         },
         {
            db: "NVD",
            id: "CVE-2019-11478",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2019-06-20T00:00:00",
            db: "CERT/CC",
            id: "VU#905115",
         },
         {
            date: "2019-06-19T00:00:00",
            db: "VULHUB",
            id: "VHN-143128",
         },
         {
            date: "2019-06-17T00:00:00",
            db: "BID",
            id: "108798",
         },
         {
            date: "2019-06-25T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2019-005618",
         },
         {
            date: "2019-06-17T19:16:05",
            db: "PACKETSTORM",
            id: "153316",
         },
         {
            date: "2019-06-17T19:16:28",
            db: "PACKETSTORM",
            id: "153319",
         },
         {
            date: "2019-10-23T18:32:10",
            db: "PACKETSTORM",
            id: "154951",
         },
         {
            date: "2019-06-17T19:16:14",
            db: "PACKETSTORM",
            id: "153317",
         },
         {
            date: "2019-06-18T15:43:26",
            db: "PACKETSTORM",
            id: "153322",
         },
         {
            date: "2019-06-18T15:43:49",
            db: "PACKETSTORM",
            id: "153324",
         },
         {
            date: "2019-06-18T15:43:16",
            db: "PACKETSTORM",
            id: "153321",
         },
         {
            date: "2019-06-18T15:43:55",
            db: "PACKETSTORM",
            id: "153325",
         },
         {
            date: "2019-07-08T14:38:09",
            db: "PACKETSTORM",
            id: "153543",
         },
         {
            date: "2019-06-25T23:49:17",
            db: "PACKETSTORM",
            id: "153424",
         },
         {
            date: "2019-06-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201906-682",
         },
         {
            date: "2019-06-19T00:15:12.687000",
            db: "NVD",
            id: "CVE-2019-11478",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2019-07-08T00:00:00",
            db: "CERT/CC",
            id: "VU#905115",
         },
         {
            date: "2020-10-20T00:00:00",
            db: "VULHUB",
            id: "VHN-143128",
         },
         {
            date: "2019-07-12T11:00:00",
            db: "BID",
            id: "108798",
         },
         {
            date: "2019-09-11T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2019-005618",
         },
         {
            date: "2021-12-20T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201906-682",
         },
         {
            date: "2024-02-27T21:04:17.560000",
            db: "NVD",
            id: "CVE-2019-11478",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201906-682",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple TCP Selective Acknowledgement (SACK) and Maximum Segment Size (MSS) networking vulnerabilities may cause denial-of-service conditions in Linux and FreeBSD kernels",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#905115",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "resource management error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201906-682",
         },
      ],
      trust: 0.6,
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.