U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2015-8567

Change History

Reanalysis by NIST 9/09/2020 11:12:39 AM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:a:qemu:qemu:-:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* versions up to (including) 2.5.1.1
Changed CPE Configuration
OR
     *cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:sp2:*:*:*:*:*:*
     *cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*
     *cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
     *cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*
     *cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:*:vmware:*:*
     *cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*
     *cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*
     *cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
     *cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*
     *cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
     *cpe:2.3:o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
OR
     *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
Removed CVSS V3
NIST AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

								
						
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
Added CWE

								
							
							
						
NIST CWE-401
Removed CWE
NIST CWE-399

								
						
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html Mailing List, Third Party Advisory
Changed Reference Type
http://www.openwall.com/lists/oss-security/2015/12/15/10 Mailing List
http://www.openwall.com/lists/oss-security/2015/12/15/10 Mailing List, Third Party Advisory
Changed Reference Type
http://www.securityfocus.com/bid/79721 Mailing List, Third Party Advisory
http://www.securityfocus.com/bid/79721 Mailing List, Third Party Advisory, VDB Entry
Changed Reference Type
https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html Mailing List, Third Party Advisory
https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html Mailing List, Patch, Third Party Advisory