Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-9df6-w2mk-37bp
Vulnerability ID VCID-9df6-w2mk-37bp
Aliases CVE-2015-7812
Summary arm: Host crash when preempting a multicall
Status Published
Exploitability 0.5
Weighted Severity 4.4
Risk 2.2
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7812.json
https://api.first.org/data/v1/epss?cve=CVE-2015-7812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
http://www.debian.org/security/2015/dsa-3414
http://www.securitytracker.com/id/1034031
http://xenbits.xen.org/xsa/advisory-145.html
1271621 https://bugzilla.redhat.com/show_bug.cgi?id=1271621
cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
CVE-2015-7812 https://nvd.nist.gov/vuln/detail/CVE-2015-7812
GLSA-201604-03 https://security.gentoo.org/glsa/201604-03
XSA-145 https://xenbits.xen.org/xsa/advisory-145.html
No exploits are available.
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2015-7812
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.22651
EPSS Score 0.00076
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:37:48.418252+00:00 Xen Importer Import https://xenbits.xen.org/xsa/advisory-145.html 38.0.0