ID

VAR-201511-0101


CVE

CVE-2015-8104


TITLE

Linux Kernel of KVM Subsystem and Xen Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-005936

DESCRIPTION

The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c. Linux Kernel is prone to a denial-of-service vulnerability. An attacker with a guest account can exploit this issue to cause an infinite loop in the host, denying service to legitimate users. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2016:0024-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-0024.html Issue date: 2016-01-12 CVE Names: CVE-2015-5307 CVE-2015-8104 ===================================================================== 1. Summary: Updated kernel packages that fix two security issues and several bugs are now available for Red Hat Enterprise Linux 6.6 Extended Update Support. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.6) - x86_64 Red Hat Enterprise Linux HPC Node EUS (v. 6.6) - noarch, x86_64 Red Hat Enterprise Linux Server EUS (v. 6.6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 6.6) - i386, ppc64, s390x, x86_64 3. * It was found that the x86 ISA (Instruction Set Architecture) is prone to a denial of service attack inside a virtualized environment in the form of an infinite loop in the microcode due to the way (sequential) delivering of benign exceptions such as #AC (alignment check exception) and #DB (debug exception) is handled. A privileged user inside a guest could use these flaws to create denial of service conditions on the host kernel. (CVE-2015-5307, CVE-2015-8104, Important) Red Hat would like to thank Ben Serebrin of Google Inc. for reporting the CVE-2015-5307 issue. This update also fixes the following bugs: * When doing TSO/GSO in the presence of VLAN headers on a macvtap device, the header offsets were incorrectly calculated. As a consequence, when 2 guests on the same host communicated over a guest configured VLAN, performance dropped to about 1 Mbps. A set of patches has been provided to fix this bug, and network performance with VLAN tags now works with optimal performance. (BZ#1215914) * Prior to this update, TSO acceleration features have been removed from the VLAN device which caused that VLAN performance on top of a virtio device was much lower than that of a virtio device itself. This update re-enables TSO acceleration features, and performance of VLAN devices on top of a virtio device has thus been restored. (BZ#1240988) * With an IPv6 address on a bond and a slave failover, Unsolicited Neighbor Advertisement (UNA) was previously sent using the link global IPv6 address as source address. The underlying source code has been patched, and, after the failover in bonding, UNA is sent using both the corresponding link IPv6 address and global IPv6 address of bond0 and bond0.vlan. (BZ#1258480) * Previously, Human Interface Device (HID) would run a report on an unaligned buffer, which could cause a page fault interrupt and an oops when the end of the report was read. This update fixes this bug by padding the end of the report with extra bytes, so the reading of the report never crosses a page boundary. As a result, a page fault and subsequent oops no longer occur. (BZ#1268202) * Inside hugetlb, region data structures were protected by a combination of a memory map semaphore and a single hugetlb instance mutex. However, a page-fault scalability improvement backported to the kernel on previous releases removed the single hugetlb instance mutex and introduced a new mutex table, making the locking combination insufficient, leading to possible race windows that could cause corruption and undefined behavior. The problem could be seen for example with software mapping or re-mapping hugetlb areas with concurrent threads reading/writing to same areas causing page faults. This update fixes the problem by introducing now a required spinlock to the region tracking functions for proper serialization. The problem only affects software using huge pages through hugetlb interface. (BZ#1274597) * Previously, VLAN stacked on the macvlan or macvtap device did not work for devices that implement and use VLAN filters. As a consequence, macvtap passthrough mode failed to transfer VLAN packets over the be2net driver. This update implements VLAN ndo calls to the macvlan driver to pass appropriate VLAN tag IDs to lower devices. As a result, macvtap transfers VLAN packets over be2net successfully. (BZ#1280205) All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1277172 - CVE-2015-5307 virt: guest to host DoS by triggering an infinite loop in microcode via #AC exception 1278496 - CVE-2015-8104 virt: guest to host DoS by triggering an infinite loop in microcode via #DB exception 6. Package List: Red Hat Enterprise Linux HPC Node EUS (v. 6.6): Source: kernel-2.6.32-504.40.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-504.40.1.el6.noarch.rpm kernel-doc-2.6.32-504.40.1.el6.noarch.rpm kernel-firmware-2.6.32-504.40.1.el6.noarch.rpm x86_64: kernel-2.6.32-504.40.1.el6.x86_64.rpm kernel-debug-2.6.32-504.40.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-504.40.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-504.40.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-504.40.1.el6.i686.rpm kernel-debug-devel-2.6.32-504.40.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.40.1.el6.i686.rpm kernel-debuginfo-2.6.32-504.40.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-504.40.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-504.40.1.el6.x86_64.rpm kernel-devel-2.6.32-504.40.1.el6.x86_64.rpm kernel-headers-2.6.32-504.40.1.el6.x86_64.rpm perf-2.6.32-504.40.1.el6.x86_64.rpm perf-debuginfo-2.6.32-504.40.1.el6.i686.rpm perf-debuginfo-2.6.32-504.40.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.40.1.el6.i686.rpm python-perf-debuginfo-2.6.32-504.40.1.el6.x86_64.rpm Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.6): x86_64: kernel-debug-debuginfo-2.6.32-504.40.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.40.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.40.1.el6.x86_64.rpm perf-debuginfo-2.6.32-504.40.1.el6.x86_64.rpm python-perf-2.6.32-504.40.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.40.1.el6.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 6.6): Source: kernel-2.6.32-504.40.1.el6.src.rpm i386: kernel-2.6.32-504.40.1.el6.i686.rpm kernel-debug-2.6.32-504.40.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-504.40.1.el6.i686.rpm kernel-debug-devel-2.6.32-504.40.1.el6.i686.rpm kernel-debuginfo-2.6.32-504.40.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-504.40.1.el6.i686.rpm kernel-devel-2.6.32-504.40.1.el6.i686.rpm kernel-headers-2.6.32-504.40.1.el6.i686.rpm perf-2.6.32-504.40.1.el6.i686.rpm perf-debuginfo-2.6.32-504.40.1.el6.i686.rpm python-perf-debuginfo-2.6.32-504.40.1.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-504.40.1.el6.noarch.rpm kernel-doc-2.6.32-504.40.1.el6.noarch.rpm kernel-firmware-2.6.32-504.40.1.el6.noarch.rpm ppc64: kernel-2.6.32-504.40.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-504.40.1.el6.ppc64.rpm kernel-debug-2.6.32-504.40.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-504.40.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-504.40.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-504.40.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-504.40.1.el6.ppc64.rpm kernel-devel-2.6.32-504.40.1.el6.ppc64.rpm kernel-headers-2.6.32-504.40.1.el6.ppc64.rpm perf-2.6.32-504.40.1.el6.ppc64.rpm perf-debuginfo-2.6.32-504.40.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-504.40.1.el6.ppc64.rpm s390x: kernel-2.6.32-504.40.1.el6.s390x.rpm kernel-debug-2.6.32-504.40.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-504.40.1.el6.s390x.rpm kernel-debug-devel-2.6.32-504.40.1.el6.s390x.rpm kernel-debuginfo-2.6.32-504.40.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-504.40.1.el6.s390x.rpm kernel-devel-2.6.32-504.40.1.el6.s390x.rpm kernel-headers-2.6.32-504.40.1.el6.s390x.rpm kernel-kdump-2.6.32-504.40.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-504.40.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-504.40.1.el6.s390x.rpm perf-2.6.32-504.40.1.el6.s390x.rpm perf-debuginfo-2.6.32-504.40.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-504.40.1.el6.s390x.rpm x86_64: kernel-2.6.32-504.40.1.el6.x86_64.rpm kernel-debug-2.6.32-504.40.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-504.40.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-504.40.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-504.40.1.el6.i686.rpm kernel-debug-devel-2.6.32-504.40.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.40.1.el6.i686.rpm kernel-debuginfo-2.6.32-504.40.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-504.40.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-504.40.1.el6.x86_64.rpm kernel-devel-2.6.32-504.40.1.el6.x86_64.rpm kernel-headers-2.6.32-504.40.1.el6.x86_64.rpm perf-2.6.32-504.40.1.el6.x86_64.rpm perf-debuginfo-2.6.32-504.40.1.el6.i686.rpm perf-debuginfo-2.6.32-504.40.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.40.1.el6.i686.rpm python-perf-debuginfo-2.6.32-504.40.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 6.6): i386: kernel-debug-debuginfo-2.6.32-504.40.1.el6.i686.rpm kernel-debuginfo-2.6.32-504.40.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-504.40.1.el6.i686.rpm perf-debuginfo-2.6.32-504.40.1.el6.i686.rpm python-perf-2.6.32-504.40.1.el6.i686.rpm python-perf-debuginfo-2.6.32-504.40.1.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-504.40.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-504.40.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-504.40.1.el6.ppc64.rpm perf-debuginfo-2.6.32-504.40.1.el6.ppc64.rpm python-perf-2.6.32-504.40.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-504.40.1.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-504.40.1.el6.s390x.rpm kernel-debuginfo-2.6.32-504.40.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-504.40.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-504.40.1.el6.s390x.rpm perf-debuginfo-2.6.32-504.40.1.el6.s390x.rpm python-perf-2.6.32-504.40.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-504.40.1.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-504.40.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-504.40.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-504.40.1.el6.x86_64.rpm perf-debuginfo-2.6.32-504.40.1.el6.x86_64.rpm python-perf-2.6.32-504.40.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-504.40.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5307 https://access.redhat.com/security/cve/CVE-2015-8104 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWlRlbXlSAg2UNWIIRAvimAKCP0NBarE2OqhzvNzvLKaBGVwd+PwCgne8S o4eKsHm6k54+KupMDbYhbEc= =Zcot -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Upstream support for the 4.1 release series has ended and since no information is available which would allow backports of isolated security fixes, security support for virtualbox in wheezy/oldstable needed to be ended as well. If you use virtualbox with externally procured VMs (e.g. through vagrant) we advise you to update to Debian jessie. CVE-2013-7446 Dmitry Vyukov discovered that a particular sequence of valid operations on local (AF_UNIX) sockets can result in a use-after-free. This may be used to cause a denial of service (crash) or possibly for privilege escalation. CVE-2015-7799 It was discovered that a user granted access to /dev/ppp can cause a denial of service (crash) by passing invalid parameters to the PPPIOCSMAXCID ioctl. This also applies to ISDN PPP device nodes. CVE-2015-7833 Sergej Schumilo, Hendrik Schwartke and Ralf Spenneberg discovered a flaw in the processing of certain USB device descriptors in the usbvision driver. An attacker with physical access to the system can use this flaw to crash the system. This was partly fixed by the changes listed in DSA 3396-1. CVE-2015-8104 Jan Beulich reported a guest to host denial-of-service flaw affecting the KVM hypervisor running on AMD processors. This leads to a panic of the host kernel. CVE-2015-8374 It was discovered that Btrfs did not correctly implement truncation of compressed inline extents. This could lead to an information leak, if a file is truncated and later made readable by other users. Additionally, it could cause data loss. This has been fixed for the stable distribution (jessie) only. CVE-2015-8543 It was discovered that a local user permitted to create raw sockets could cause a denial-of-service by specifying an invalid protocol number for the socket. The attacker must have the CAP_NET_RAW capability in their user namespace. This has been fixed for the stable distribution (jessie) only. For the oldstable distribution (wheezy), these problems have been fixed in version 3.2.73-2+deb7u1. In addition, this update contains several changes originally targeted for the upcoming Wheezy point release. For the stable distribution (jessie), these problems have been fixed in version 3.16.7-ckt20-1+deb8u1. In addition, this update contains several changes originally targeted for the upcoming Jessie point release. Content-Disposition: inline ============================================================================ Ubuntu Security Notice USN-2843-1 December 17, 2015 linux vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 15.10 Summary: Several security issues were fixed in the kernel. (CVE-2015-8104) =E9=83=AD=E6=B0=B8=E5=88=9A discovered that the ppp implementation in the Linux kernel did not ensure that certain slot numbers are valid. (CVE-2015-7799) Dmitry Vyukov discovered that the Linux kernel's keyring handler attempted to garbage collect incompletely instantiated keys. (CVE-2015-7872) It was discovered that the virtual video osd test driver in the Linux kernel did not properly initialize data structures. (CVE-2015-7884) It was discovered that the driver for Digi Neo and ClassicBoard devices did not properly initialize data structures. (CVE-2015-7885) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 15.10: linux-image-4.2.0-21-generic 4.2.0-21.25 linux-image-4.2.0-21-generic-lpae 4.2.0-21.25 linux-image-4.2.0-21-lowlatency 4.2.0-21.25 linux-image-4.2.0-21-powerpc-e500mc 4.2.0-21.25 linux-image-4.2.0-21-powerpc-smp 4.2.0-21.25 linux-image-4.2.0-21-powerpc64-emb 4.2.0-21.25 linux-image-4.2.0-21-powerpc64-smp 4.2.0-21.25 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well

Trust: 2.52

sources: NVD: CVE-2015-8104 // JVNDB: JVNDB-2015-005936 // BID: 77524 // VULMON: CVE-2015-8104 // PACKETSTORM: 134907 // PACKETSTORM: 135227 // PACKETSTORM: 134910 // PACKETSTORM: 135399 // PACKETSTORM: 134981 // PACKETSTORM: 134911

AFFECTED PRODUCTS

vendor:oraclemodel:solarisscope:eqversion:11.3

Trust: 2.1

vendor:xenmodel:xenscope:eqversion:4.5.0

Trust: 1.9

vendor:xenmodel:xenscope:eqversion:4.5.1

Trust: 1.6

vendor:xenmodel:xenscope:eqversion:4.4.3

Trust: 1.6

vendor:xenmodel:xenscope:eqversion:4.3.0

Trust: 1.3

vendor:xenmodel:xenscope:eqversion:4.4.1

Trust: 1.3

vendor:xenmodel:xenscope:eqversion:4.3.1

Trust: 1.3

vendor:xenmodel:xenscope:eqversion:4.4.0

Trust: 1.3

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:linuxmodel:kernelscope:lteversion:4.2.3

Trust: 1.0

vendor:oraclemodel:vm virtualboxscope:lteversion:4.3.35

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:15.04

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:7.0

Trust: 1.0

vendor:xenmodel:xenscope:eqversion:4.6.4

Trust: 1.0

vendor:oraclemodel:vm virtualboxscope:lteversion:5.0.13

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:xenmodel:xenscope:eqversion:4.3.3

Trust: 1.0

vendor:xenmodel:xenscope:eqversion:4.5.2

Trust: 1.0

vendor:xenmodel:xenscope:eqversion:4.6.1

Trust: 1.0

vendor:oraclemodel:vm virtualboxscope:gteversion:4.0.0

Trust: 1.0

vendor:oraclemodel:vm virtualboxscope:gteversion:4.2.0

Trust: 1.0

vendor:oraclemodel:vm virtualboxscope:lteversion:4.2.34

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:xenmodel:xenscope:eqversion:4.3.4

Trust: 1.0

vendor:xenmodel:xenscope:eqversion:4.6.2

Trust: 1.0

vendor:xenmodel:xenscope:eqversion:4.3.2

Trust: 1.0

vendor:xenmodel:xenscope:eqversion:4.4.2

Trust: 1.0

vendor:oraclemodel:vm virtualboxscope:gteversion:4.3.0

Trust: 1.0

vendor:oraclemodel:vm virtualboxscope:lteversion:4.0.34

Trust: 1.0

vendor:oraclemodel:vm virtualboxscope:gteversion:5.0.0

Trust: 1.0

vendor:xenmodel:xenscope:eqversion:4.6.0

Trust: 1.0

vendor:oraclemodel:vm virtualboxscope:lteversion:4.1.42

Trust: 1.0

vendor:xenmodel:xenscope:eqversion:4.6.5

Trust: 1.0

vendor:oraclemodel:vm virtualboxscope:gteversion:4.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:lteversion:4.2.6

Trust: 0.8

vendor:xenmodel:xenscope:eqversion:4.3.x to 4.6.x

Trust: 0.8

vendor:oraclemodel:vm virtualboxscope:ltversion:4.0.36

Trust: 0.8

vendor:oraclemodel:vm virtualboxscope:ltversion:4.1.44

Trust: 0.8

vendor:oraclemodel:vm virtualboxscope:ltversion:4.2.36

Trust: 0.8

vendor:oraclemodel:vm virtualboxscope:ltversion:4.3.34

Trust: 0.8

vendor:oraclemodel:vm virtualboxscope:ltversion:5.0.10

Trust: 0.8

vendor:linuxmodel:kernelscope:eqversion:3.2.62

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.0.34

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.1

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.36

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.80

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.0.16

Trust: 0.3

vendor:citrixmodel:xenserver service packscope:eqversion:6.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.4

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.4

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.8

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:neversion:4.2.36

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.2.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.12

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.29

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.2

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.1.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.20

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.2.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.65

Trust: 0.3

vendor:microsoftmodel:windows version for x64-based systemsscope:eqversion:1015110

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:junipermodel:junos space 15.1f2scope: - version: -

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0.8

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.2.2

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.0.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.45

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.42

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.6

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.0.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.88

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.48

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:neversion:4.3.34

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.8

Trust: 0.3

vendor:redhatmodel:enterprise linux server eus 6.6.zscope: - version: -

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.4.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.9

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.24

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.22

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.0.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.3

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.0

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systemsscope:eqversion:80

Trust: 0.3

vendor:junipermodel:junos space 15.1r2.11scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.3

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.2

Trust: 0.3

vendor:oraclemodel:linuxscope:eqversion:6.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.2.3

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0

Trust: 0.3

vendor:citrixmodel:xenserver common criteriascope:eqversion:6.0.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.8

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.0.5

Trust: 0.3

vendor:microsoftmodel:windows serverscope:eqversion:20120

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.34

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.0.14

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.2.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.54

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.11

Trust: 0.3

vendor:citrixmodel:xenserver sp1scope:eqversion:6.2.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.18

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.2.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.87

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.90

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.53

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.4.0

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:12.3

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.0.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.3

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.0.30

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.71

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.1.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.67

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.2.26

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.40

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.11

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:13.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.26

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.0.24

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.70

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6

Trust: 0.3

vendor:junipermodel:junos space 15.2r1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.15

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.1.0

Trust: 0.3

vendor:microsoftmodel:windows server r2scope:eqversion:20120

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.22

Trust: 0.3

vendor:oraclemodel:linuxscope:eqversion:6

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.0.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.2

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.3.2

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.1.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.29

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.34

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.62

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.76

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.4.2

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.1.3

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:5.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.24

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.10

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.43

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.44

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.0.3

Trust: 0.3

vendor:microsoftmodel:windows server r2 for x64-based systems sp1scope:eqversion:2008

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.55

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.3.4

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.2.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.81

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.50

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.2.22

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.37

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.30

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3.2

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.3.9

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.2.19

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.2.10

Trust: 0.3

vendor:microsoftmodel:windows server for x64-based systems sp2scope:eqversion:2008

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.59

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:5.0.9

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.3.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.11

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.0.23

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.0.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.72

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.0.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.75

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.66

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.0.2

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.2.20

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.32

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.2

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:13.3

Trust: 0.3

vendor:citrixmodel:xenserver sp1scope:eqversion:6.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.64

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.63

Trust: 0.3

vendor:junipermodel:junos space 15.2r2scope: - version: -

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:neversion:4.0.36

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.7

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:6.1

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.26

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.2.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.93

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.1

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.1

Trust: 0.3

vendor:citrixmodel:xenserver common criteriascope:eqversion:5.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.57

Trust: 0.3

vendor:oraclemodel:linuxscope:eqversion:5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.31

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.31

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.0.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.0.6

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.2.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.73

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.19

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.1

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.1.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.64

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.1.6.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.23

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.56

Trust: 0.3

vendor:junipermodel:junos space 14.1r1.9scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.25

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.2.18

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.13

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.43

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systemsscope:eqversion:8.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.18

Trust: 0.3

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.44

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.0.20

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.17

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.73

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.2.24

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.27

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.65

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.7

Trust: 0.3

vendor:junipermodel:junos space 16.1r1scope:neversion: -

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.4.4

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:5.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.9.8

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.42

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.30

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.0.26

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.3.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.3

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.0.18

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.9

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.2.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.41

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.26

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.31

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.18

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.4

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.32

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.58

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.10

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:13.1

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.0

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.0.35

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:12.1

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.2

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.0.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.12

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.2.30

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:5.6

Trust: 0.3

vendor:susemodel:linux enterprise server sp4 ltssscope:eqversion:10

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.2.34

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.6

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.38

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.13

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:6.0.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.5

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.0.2

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.35

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.72

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.16

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.7

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.2.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.38

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.52

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.2.12

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.1.8

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:neversion:4.1.44

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.18.11

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.14

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.1

Trust: 0.3

vendor:citrixmodel:xenserver fp1scope:eqversion:5.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.4

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.38

Trust: 0.3

vendor:citrixmodel:xenserver sp2scope:eqversion:5.6

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:neversion:5.0.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:6.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.51

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.86

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:4.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.21

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.0

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.18

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.1.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.37

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.54

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.2

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.60

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.16

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.3.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.12.49

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.4

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.9

Trust: 0.3

vendor:junipermodel:northstar controller application service packscope:neversion:2.1.01

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.19.3

Trust: 0.3

vendor:junipermodel:junos space 14.1r1scope: - version: -

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.20

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.6

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.4.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.58

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.0.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.15

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:4.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.2.72

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.2.1

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:6.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.1

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.81

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.37

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.60

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systemsscope:eqversion:100

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.3

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:citrixmodel:xenserver updatescope:eqversion:5.02

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.1

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.3.8

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.17

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:3.2.1

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:1.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.20

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.19

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.28

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.3.7

Trust: 0.3

vendor:citrixmodel:xenserverscope:eqversion:6.5

Trust: 0.3

vendor:citrixmodel:xenserver update1scope:eqversion:5.5

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.14

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.4.1

Trust: 0.3

vendor:oraclemodel:linuxscope:eqversion:0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.69

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.14.45

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.1.42

Trust: 0.3

vendor:junipermodel:northstar controller applicationscope:eqversion:2.1.0

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.7

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.9

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.8.6

Trust: 0.3

vendor:xenmodel:xenscope:eqversion:4.1.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.36

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.0.98

Trust: 0.3

vendor:junipermodel:junos spacescope:eqversion:11.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.17.6

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.1

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.2.35

Trust: 0.3

vendor:oraclemodel:vm virtualboxscope:eqversion:4.3.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.5.5

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.10.10

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.6.6

Trust: 0.3

vendor:citrixmodel:xenserver updatescope:eqversion:5.03

Trust: 0.3

vendor:oraclemodel:vm server forscope:eqversion:x863.2

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.3

Trust: 0.3

vendor:linuxmodel:kernelscope:eqversion:3.13.7

Trust: 0.3

sources: BID: 77524 // JVNDB: JVNDB-2015-005936 // CNNVD: CNNVD-201511-259 // NVD: CVE-2015-8104

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-8104
value: MEDIUM

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2015-8104
value: CRITICAL

Trust: 1.0

NVD: CVE-2015-8104
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201511-259
value: MEDIUM

Trust: 0.6

VULMON: CVE-2015-8104
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-8104
severity: MEDIUM
baseScore: 4.7
vectorString: AV:L/AC:M/AU:N/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2015-8104
baseSeverity: CRITICAL
baseScore: 10.0
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 6.0
version: 3.1

Trust: 1.0

sources: VULMON: CVE-2015-8104 // JVNDB: JVNDB-2015-005936 // CNNVD: CNNVD-201511-259 // NVD: CVE-2015-8104 // NVD: CVE-2015-8104

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.8

sources: JVNDB: JVNDB-2015-005936 // NVD: CVE-2015-8104

THREAT TYPE

local

Trust: 0.9

sources: PACKETSTORM: 134907 // PACKETSTORM: 134910 // PACKETSTORM: 134911 // CNNVD: CNNVD-201511-259

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201511-259

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-005936

PATCH

title:CTX203879url:http://support.citrix.com/article/CTX203879

Trust: 0.8

title:KVM: svm: unconditionally intercept #DBurl:https://github.com/torvalds/linux/commit/cbdb967af3d54993f5814f1cee0ed311a055377d

Trust: 0.8

title:Linux Kernel Archivesurl:http://www.kernel.org

Trust: 0.8

title:KVM: svm: unconditionally intercept #DBurl:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbdb967af3d54993f5814f1cee0ed311a055377d

Trust: 0.8

title:Oracle Critical Patch Update Advisory - January 2016url:http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

Trust: 0.8

title:Text Form of Oracle Critical Patch Update - January 2016 Risk Matricesurl:http://www.oracle.com/technetwork/topics/security/cpujan2016verbose-2367956.html

Trust: 0.8

title:Oracle Critical Patch Update Advisory - July 2016url:http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

Trust: 0.8

title:Text Form of Oracle Critical Patch Update - July 2016 Risk Matricesurl:http://www.oracle.com/technetwork/topics/security/cpujul2016verbose-2881721.html

Trust: 0.8

title:Bug 1278496url:https://bugzilla.redhat.com/show_bug.cgi?id=1278496

Trust: 0.8

title:January 2016 Critical Patch Update Releasedurl:https://blogs.oracle.com/security/entry/january_2016_critical_patch_update

Trust: 0.8

title:July 2016 Critical Patch Update Releasedurl:https://blogs.oracle.com/security/entry/july_2016_critical_patch_update

Trust: 0.8

title:XSA-156url:http://xenbits.xen.org/xsa/advisory-156.html

Trust: 0.8

title:Linux kernel KVM and Xen Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58747

Trust: 0.6

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20160004 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20152645 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20152552 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20152636 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2840-1

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2841-1

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-utopic vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2844-1

Trust: 0.1

title:Red Hat: CVE-2015-8104url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-8104

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-trusty vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2841-2

Trust: 0.1

title:Debian Security Advisories: DSA-3454-1 virtualbox -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=77cc990635f1378372ad437247c70f65

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-vivid vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2842-2

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2842-1

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2843-1

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-wily vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2843-2

Trust: 0.1

title:Debian Security Advisories: DSA-3426-1 linux -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=2582c3762590f583f07dd6e6807c1b8d

Trust: 0.1

title:Debian Security Advisories: DSA-3414-1 xen -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=d81330fe0cb138acbe2c11ee586167b2

Trust: 0.1

title:Debian CVElist Bug Report Logs: Multiple security issuesurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=d3f34965665f8672bfcf7c84c5b82813

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - October 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=435ed9abc2fb1e74ce2a69605a01e326

Trust: 0.1

title:Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - July 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins&qid=6c15273f6bf4a785175f27073b98a1ce

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - January 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=8ad80411af3e936eb2998df70506cc71

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - July 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=3a04485ebb79f7fbc2472bf9af5ce489

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=63802a6c83b107c4e6e0c7f9241a66a8

Trust: 0.1

title:cve_diff_checkerurl:https://github.com/lcatro/cve_diff_checker

Trust: 0.1

title:CVE-Studyurl:https://github.com/thdusdl1219/CVE-Study

Trust: 0.1

sources: VULMON: CVE-2015-8104 // JVNDB: JVNDB-2015-005936 // CNNVD: CNNVD-201511-259

EXTERNAL IDS

db:NVDid:CVE-2015-8104

Trust: 3.4

db:OPENWALLid:OSS-SECURITY/2015/11/10/5

Trust: 1.7

db:BIDid:77524

Trust: 1.4

db:JUNIPERid:JSA10783

Trust: 1.4

db:BIDid:91787

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2023/10/10/4

Trust: 1.1

db:SECTRACKid:1034105

Trust: 1.1

db:JVNDBid:JVNDB-2015-005936

Trust: 0.8

db:CNNVDid:CNNVD-201511-259

Trust: 0.6

db:JUNIPERid:JSA10770

Trust: 0.3

db:VULMONid:CVE-2015-8104

Trust: 0.1

db:PACKETSTORMid:134907

Trust: 0.1

db:PACKETSTORMid:135227

Trust: 0.1

db:PACKETSTORMid:134910

Trust: 0.1

db:PACKETSTORMid:135399

Trust: 0.1

db:PACKETSTORMid:134981

Trust: 0.1

db:PACKETSTORMid:134911

Trust: 0.1

sources: VULMON: CVE-2015-8104 // BID: 77524 // PACKETSTORM: 134907 // PACKETSTORM: 135227 // PACKETSTORM: 134910 // PACKETSTORM: 135399 // PACKETSTORM: 134981 // PACKETSTORM: 134911 // JVNDB: JVNDB-2015-005936 // CNNVD: CNNVD-201511-259 // NVD: CVE-2015-8104

REFERENCES

url:https://bugzilla.redhat.com/show_bug.cgi?id=1278496

Trust: 2.0

url:http://xenbits.xen.org/xsa/advisory-156.html

Trust: 2.0

url:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbdb967af3d54993f5814f1cee0ed311a055377d

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2015/11/10/5

Trust: 1.7

url:https://github.com/torvalds/linux/commit/cbdb967af3d54993f5814f1cee0ed311a055377d

Trust: 1.7

url:http://support.citrix.com/article/ctx203879

Trust: 1.4

url:http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

Trust: 1.4

url:http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

Trust: 1.4

url:http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

Trust: 1.4

url:http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html

Trust: 1.4

url:http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html

Trust: 1.4

url:http://support.citrix.com/article/ctx202583

Trust: 1.4

url:http://www.securityfocus.com/bid/77524

Trust: 1.2

url:http://www.ubuntu.com/usn/usn-2843-1

Trust: 1.2

url:http://www.ubuntu.com/usn/usn-2841-1

Trust: 1.2

url:http://www.ubuntu.com/usn/usn-2842-1

Trust: 1.2

url:http://www.ubuntu.com/usn/usn-2842-2

Trust: 1.2

url:http://www.securityfocus.com/bid/91787

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2016-0046.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-november/172435.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html

Trust: 1.1

url:http://www.securitytracker.com/id/1034105

Trust: 1.1

url:http://www.debian.org/security/2016/dsa-3454

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2015-2636.html

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-2843-2

Trust: 1.1

url:http://www.debian.org/security/2015/dsa-3426

Trust: 1.1

url:http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-november/172300.html

Trust: 1.1

url:http://www.debian.org/security/2015/dsa-3414

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-november/172187.html

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-2844-1

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-2841-2

Trust: 1.1

url:http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2015-2645.html

Trust: 1.1

url:http://www.ubuntu.com/usn/usn-2840-1

Trust: 1.1

url:https://kb.juniper.net/jsa10783

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2023/10/10/4

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8104

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8104

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2015-8104

Trust: 0.6

url:https://rhn.redhat.com/errata/rhsa-2016-0024.html

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-7799

Trust: 0.4

url:http://www.linux-kvm.org/page/main_page

Trust: 0.3

url:http://www.xen.org/

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10770&actp=rss

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10783&cat=sirt_1&actp=list

Trust: 0.3

url:https://technet.microsoft.com/library/security/3108638.aspx

Trust: 0.3

url:http://seclists.org/oss-sec/2015/q4/249

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2016-0004.html

Trust: 0.3

url:http://seclists.org/oss-sec/2015/q4/245

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-7885

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2015-8104

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-5307

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-7884

Trust: 0.2

url:https://www.debian.org/security/faq

Trust: 0.2

url:https://www.debian.org/security/

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/399.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2016:0004

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/2840-1/

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=47152

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/3.13.0-73.116

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5307

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-lts-vivid/3.19.0-41.46~14.04.2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-0495

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-0592

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7833

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-7446

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8543

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8374

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7872

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.2.0-21.25

Trust: 0.1

sources: VULMON: CVE-2015-8104 // BID: 77524 // PACKETSTORM: 134907 // PACKETSTORM: 135227 // PACKETSTORM: 134910 // PACKETSTORM: 135399 // PACKETSTORM: 134981 // PACKETSTORM: 134911 // JVNDB: JVNDB-2015-005936 // CNNVD: CNNVD-201511-259 // NVD: CVE-2015-8104

CREDITS

Ben Serebrin from Google and Jan Beulich from SUSE.

Trust: 0.3

sources: BID: 77524

SOURCES

db:VULMONid:CVE-2015-8104
db:BIDid:77524
db:PACKETSTORMid:134907
db:PACKETSTORMid:135227
db:PACKETSTORMid:134910
db:PACKETSTORMid:135399
db:PACKETSTORMid:134981
db:PACKETSTORMid:134911
db:JVNDBid:JVNDB-2015-005936
db:CNNVDid:CNNVD-201511-259
db:NVDid:CVE-2015-8104

LAST UPDATE DATE

2025-08-07T21:38:56.907000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2015-8104date:2023-10-10T00:00:00
db:BIDid:77524date:2017-05-02T07:07:00
db:JVNDBid:JVNDB-2015-005936date:2016-07-27T00:00:00
db:CNNVDid:CNNVD-201511-259date:2019-02-18T00:00:00
db:NVDid:CVE-2015-8104date:2025-04-23T16:15:20.013

SOURCES RELEASE DATE

db:VULMONid:CVE-2015-8104date:2015-11-16T00:00:00
db:BIDid:77524date:2015-11-10T00:00:00
db:PACKETSTORMid:134907date:2015-12-17T16:46:24
db:PACKETSTORMid:135227date:2016-01-12T15:55:00
db:PACKETSTORMid:134910date:2015-12-17T16:46:51
db:PACKETSTORMid:135399date:2016-01-27T17:24:03
db:PACKETSTORMid:134981date:2015-12-18T21:20:16
db:PACKETSTORMid:134911date:2015-12-17T16:47:05
db:JVNDBid:JVNDB-2015-005936date:2015-11-17T00:00:00
db:CNNVDid:CNNVD-201511-259date:2015-11-17T00:00:00
db:NVDid:CVE-2015-8104date:2015-11-16T11:59:12.043