U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2018-10875

Change History

Modified Analysis by NIST 5/10/2019 3:21:40 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:redhat:ansible_engine:2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:ansible_engine:2.4:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:ansible_engine:2.5:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:ansible_engine:2.6:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openstack:13.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:redhat:ansible_engine:2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:ansible_engine:2.4:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:ansible_engine:2.5:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:ansible_engine:2.6:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:gluster_storage:3.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openshift:3.0:*:*:*:enterprise:*:*:*
     *cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openstack:13.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html Third Party Advisory