U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2015-4036

Change History

Modified Analysis by NIST 11/21/2023 2:15:17 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to (including) 3.18.0
OR
     *cpe:2.3:o:linux:linux_kernel:3.6:-:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.6:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.6:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.6:rc4:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.6:rc5:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.6:rc6:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:3.6:rc7:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (excluding) 3.6 up to (excluding) 3.10.90
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 3.11 up to (excluding) 3.12.44
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 3.13 up to (excluding) 3.14.57
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 3.15 up to (excluding) 3.16.35
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 3.17 up to (excluding) 3.18.25
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 3.19 up to (excluding) 4.0
Changed Reference Type
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c No Types Assigned
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html Third Party Advisory
Changed Reference Type
http://www.openwall.com/lists/oss-security/2015/05/13/4 Exploit
http://www.openwall.com/lists/oss-security/2015/05/13/4 Exploit, Mailing List, Third Party Advisory
Changed Reference Type
http://www.securityfocus.com/bid/74664 No Types Assigned
http://www.securityfocus.com/bid/74664 URL Repurposed, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id/1033729 No Types Assigned
http://www.securitytracker.com/id/1033729 URL Repurposed
Changed Reference Type
http://www.ubuntu.com/usn/USN-2633-1 No Types Assigned
http://www.ubuntu.com/usn/USN-2633-1 Third Party Advisory
Changed Reference Type
http://www.ubuntu.com/usn/USN-2634-1 No Types Assigned
http://www.ubuntu.com/usn/USN-2634-1 Third Party Advisory
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=1189864 No Types Assigned
https://bugzilla.redhat.com/show_bug.cgi?id=1189864 Issue Tracking, Third Party Advisory
Changed Reference Type
https://github.com/torvalds/linux/commit/59c816c1f24df0204e01851431d3bab3eb76719c No Types Assigned
https://github.com/torvalds/linux/commit/59c816c1f24df0204e01851431d3bab3eb76719c Third Party Advisory