Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-2h35-vvte-g7cs
Vulnerability ID VCID-2h35-vvte-g7cs
Aliases CVE-2015-8104
Summary x86: CPU lockup during exception delivery
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
cvssv3.1 10 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbdb967af3d54993f5814f1cee0ed311a055377d
ssvc Track http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbdb967af3d54993f5814f1cee0ed311a055377d
cvssv3.1 10 http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html
ssvc Track http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html
cvssv3.1 10 http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html
ssvc Track http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html
cvssv3.1 10 http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html
ssvc Track http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html
cvssv3.1 10 http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
cvssv3.1 10 http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
cvssv3.1 10 http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
cvssv3.1 10 http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
cvssv3.1 10 http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
cvssv3.1 10 http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
cvssv3.1 10 http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
ssvc Track http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
cvssv3.1 10 http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
ssvc Track http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
cvssv3.1 10 http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
ssvc Track http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
cvssv3.1 10 http://rhn.redhat.com/errata/RHSA-2015-2636.html
ssvc Track http://rhn.redhat.com/errata/RHSA-2015-2636.html
cvssv3.1 10 http://rhn.redhat.com/errata/RHSA-2015-2645.html
ssvc Track http://rhn.redhat.com/errata/RHSA-2015-2645.html
cvssv3.1 10 http://rhn.redhat.com/errata/RHSA-2016-0046.html
ssvc Track http://rhn.redhat.com/errata/RHSA-2016-0046.html
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2015-8104
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2015-8104
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2015-8104
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2015-8104
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2015-8104
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2015-8104
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2015-8104
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2015-8104
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2015-8104
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2015-8104
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2015-8104
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2015-8104
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2015-8104
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2015-8104
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2015-8104
cvssv3.1 10 https://bugzilla.redhat.com/show_bug.cgi?id=1278496
ssvc Track https://bugzilla.redhat.com/show_bug.cgi?id=1278496
cvssv3.1 10 https://github.com/torvalds/linux/commit/cbdb967af3d54993f5814f1cee0ed311a055377d
ssvc Track https://github.com/torvalds/linux/commit/cbdb967af3d54993f5814f1cee0ed311a055377d
cvssv3.1 10 https://kb.juniper.net/JSA10783
ssvc Track https://kb.juniper.net/JSA10783
cvssv2 4.7 https://nvd.nist.gov/vuln/detail/CVE-2015-8104
cvssv3.1 10.0 https://nvd.nist.gov/vuln/detail/CVE-2015-8104
cvssv3.1 10 http://support.citrix.com/article/CTX202583
ssvc Track http://support.citrix.com/article/CTX202583
cvssv3.1 10 http://support.citrix.com/article/CTX203879
ssvc Track http://support.citrix.com/article/CTX203879
cvssv3.1 10 http://www.debian.org/security/2015/dsa-3414
ssvc Track http://www.debian.org/security/2015/dsa-3414
cvssv3.1 10 http://www.debian.org/security/2015/dsa-3426
ssvc Track http://www.debian.org/security/2015/dsa-3426
cvssv3.1 10 http://www.debian.org/security/2016/dsa-3454
ssvc Track http://www.debian.org/security/2016/dsa-3454
cvssv3.1 10 http://www.openwall.com/lists/oss-security/2015/11/10/5
ssvc Track http://www.openwall.com/lists/oss-security/2015/11/10/5
cvssv3.1 10 http://www.openwall.com/lists/oss-security/2023/10/10/4
ssvc Track http://www.openwall.com/lists/oss-security/2023/10/10/4
cvssv3.1 10 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
ssvc Track http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
cvssv3.1 10 http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
ssvc Track http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
cvssv3.1 10 http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
ssvc Track http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
cvssv3.1 10 http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
ssvc Track http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
cvssv3.1 10 http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
ssvc Track http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
cvssv3.1 10 http://www.securityfocus.com/bid/77524
ssvc Track http://www.securityfocus.com/bid/77524
cvssv3.1 10 http://www.securityfocus.com/bid/91787
ssvc Track http://www.securityfocus.com/bid/91787
cvssv3.1 10 http://www.securitytracker.com/id/1034105
ssvc Track http://www.securitytracker.com/id/1034105
cvssv3.1 10 http://www.ubuntu.com/usn/USN-2840-1
ssvc Track http://www.ubuntu.com/usn/USN-2840-1
cvssv3.1 10 http://www.ubuntu.com/usn/USN-2841-1
ssvc Track http://www.ubuntu.com/usn/USN-2841-1
cvssv3.1 10 http://www.ubuntu.com/usn/USN-2841-2
ssvc Track http://www.ubuntu.com/usn/USN-2841-2
cvssv3.1 10 http://www.ubuntu.com/usn/USN-2842-1
ssvc Track http://www.ubuntu.com/usn/USN-2842-1
cvssv3.1 10 http://www.ubuntu.com/usn/USN-2842-2
ssvc Track http://www.ubuntu.com/usn/USN-2842-2
cvssv3.1 10 http://www.ubuntu.com/usn/USN-2843-1
ssvc Track http://www.ubuntu.com/usn/USN-2843-1
cvssv3.1 10 http://www.ubuntu.com/usn/USN-2843-2
ssvc Track http://www.ubuntu.com/usn/USN-2843-2
cvssv3.1 10 http://www.ubuntu.com/usn/USN-2844-1
ssvc Track http://www.ubuntu.com/usn/USN-2844-1
cvssv3.1 10 http://xenbits.xen.org/xsa/advisory-156.html
ssvc Track http://xenbits.xen.org/xsa/advisory-156.html
Reference id Reference type URL
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbdb967af3d54993f5814f1cee0ed311a055377d
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
http://rhn.redhat.com/errata/RHSA-2015-2636.html
http://rhn.redhat.com/errata/RHSA-2015-2645.html
http://rhn.redhat.com/errata/RHSA-2016-0046.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8104.json
https://api.first.org/data/v1/epss?cve=CVE-2015-8104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0592
https://github.com/torvalds/linux/commit/cbdb967af3d54993f5814f1cee0ed311a055377d
https://kb.juniper.net/JSA10783
http://support.citrix.com/article/CTX202583
http://support.citrix.com/article/CTX203879
http://www.debian.org/security/2015/dsa-3414
http://www.debian.org/security/2015/dsa-3426
http://www.debian.org/security/2016/dsa-3454
http://www.openwall.com/lists/oss-security/2015/11/10/5
http://www.openwall.com/lists/oss-security/2023/10/10/4
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/77524
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1034105
http://www.ubuntu.com/usn/USN-2840-1
http://www.ubuntu.com/usn/USN-2841-1
http://www.ubuntu.com/usn/USN-2841-2
http://www.ubuntu.com/usn/USN-2842-1
http://www.ubuntu.com/usn/USN-2842-2
http://www.ubuntu.com/usn/USN-2843-1
http://www.ubuntu.com/usn/USN-2843-2
http://www.ubuntu.com/usn/USN-2844-1
http://xenbits.xen.org/xsa/advisory-156.html
1278496 https://bugzilla.redhat.com/show_bug.cgi?id=1278496
823620 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620
cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*
CVE-2015-8104 https://nvd.nist.gov/vuln/detail/CVE-2015-8104
RHSA-2015:2552 https://access.redhat.com/errata/RHSA-2015:2552
RHSA-2015:2636 https://access.redhat.com/errata/RHSA-2015:2636
RHSA-2015:2645 https://access.redhat.com/errata/RHSA-2015:2645
RHSA-2016:0004 https://access.redhat.com/errata/RHSA-2016:0004
RHSA-2016:0024 https://access.redhat.com/errata/RHSA-2016:0024
RHSA-2016:0046 https://access.redhat.com/errata/RHSA-2016:0046
RHSA-2016:0103 https://access.redhat.com/errata/RHSA-2016:0103
USN-2840-1 https://usn.ubuntu.com/2840-1/
USN-2841-1 https://usn.ubuntu.com/2841-1/
USN-2841-2 https://usn.ubuntu.com/2841-2/
USN-2842-1 https://usn.ubuntu.com/2842-1/
USN-2842-2 https://usn.ubuntu.com/2842-2/
USN-2843-1 https://usn.ubuntu.com/2843-1/
USN-2843-2 https://usn.ubuntu.com/2843-2/
USN-2844-1 https://usn.ubuntu.com/2844-1/
XSA-156 https://xenbits.xen.org/xsa/advisory-156.html
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbdb967af3d54993f5814f1cee0ed311a055377d
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbdb967af3d54993f5814f1cee0ed311a055377d
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://rhn.redhat.com/errata/RHSA-2015-2636.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://rhn.redhat.com/errata/RHSA-2015-2636.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://rhn.redhat.com/errata/RHSA-2015-2645.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://rhn.redhat.com/errata/RHSA-2015-2645.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://rhn.redhat.com/errata/RHSA-2016-0046.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://rhn.redhat.com/errata/RHSA-2016-0046.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://bugzilla.redhat.com/show_bug.cgi?id=1278496
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=1278496
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://github.com/torvalds/linux/commit/cbdb967af3d54993f5814f1cee0ed311a055377d
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at https://github.com/torvalds/linux/commit/cbdb967af3d54993f5814f1cee0ed311a055377d
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://kb.juniper.net/JSA10783
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at https://kb.juniper.net/JSA10783
Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2015-8104
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2015-8104
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://support.citrix.com/article/CTX202583
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://support.citrix.com/article/CTX202583
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://support.citrix.com/article/CTX203879
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://support.citrix.com/article/CTX203879
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.debian.org/security/2015/dsa-3414
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.debian.org/security/2015/dsa-3414
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.debian.org/security/2015/dsa-3426
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.debian.org/security/2015/dsa-3426
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.debian.org/security/2016/dsa-3454
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.debian.org/security/2016/dsa-3454
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2015/11/10/5
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.openwall.com/lists/oss-security/2015/11/10/5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2023/10/10/4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.openwall.com/lists/oss-security/2023/10/10/4
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.securityfocus.com/bid/77524
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.securityfocus.com/bid/77524
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.securityfocus.com/bid/91787
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.securityfocus.com/bid/91787
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.securitytracker.com/id/1034105
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.securitytracker.com/id/1034105
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.ubuntu.com/usn/USN-2840-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.ubuntu.com/usn/USN-2840-1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.ubuntu.com/usn/USN-2841-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.ubuntu.com/usn/USN-2841-1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.ubuntu.com/usn/USN-2841-2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.ubuntu.com/usn/USN-2841-2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.ubuntu.com/usn/USN-2842-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.ubuntu.com/usn/USN-2842-1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.ubuntu.com/usn/USN-2842-2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.ubuntu.com/usn/USN-2842-2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.ubuntu.com/usn/USN-2843-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.ubuntu.com/usn/USN-2843-1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.ubuntu.com/usn/USN-2843-2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.ubuntu.com/usn/USN-2843-2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.ubuntu.com/usn/USN-2844-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://www.ubuntu.com/usn/USN-2844-1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://xenbits.xen.org/xsa/advisory-156.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/ Found at http://xenbits.xen.org/xsa/advisory-156.html
Exploit Prediction Scoring System (EPSS)
Percentile 0.55511
EPSS Score 0.00327
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:37:48.589488+00:00 Xen Importer Import https://xenbits.xen.org/xsa/advisory-156.html 38.0.0