U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2016-8649

Change History

Initial Analysis by NIST 5/16/2017 1:45:43 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:linuxcontainers:lxc:1.0.8:*:*:*:*:*:*:* (and previous)
     *cpe:2.3:a:linuxcontainers:lxc:2.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc10:*:*:*:*:*:*
     *cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc11:*:*:*:*:*:*
     *cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc12:*:*:*:*:*:*
     *cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc13:*:*:*:*:*:*
     *cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc14:*:*:*:*:*:*
     *cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc15:*:*:*:*:*:*
     *cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc2:*:*:*:*:*:*
     *cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc3:*:*:*:*:*:*
     *cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc4:*:*:*:*:*:*
     *cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc5:*:*:*:*:*:*
     *cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc6:*:*:*:*:*:*
     *cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc7:*:*:*:*:*:*
     *cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc8:*:*:*:*:*:*
     *cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc9:*:*:*:*:*:*
     *cpe:2.3:a:linuxcontainers:lxc:2.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:linuxcontainers:lxc:2.0.2:*:*:*:*:*:*:*
     *cpe:2.3:a:linuxcontainers:lxc:2.0.3:*:*:*:*:*:*:*
     *cpe:2.3:a:linuxcontainers:lxc:2.0.4:*:*:*:*:*:*:*
     *cpe:2.3:a:linuxcontainers:lxc:2.0.5:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Added CVSS V3

								
							
							
						
AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Added CWE

								
							
							
						
CWE-264
Changed Reference Type
http://www.securityfocus.com/bid/94498 No Types Assigned
http://www.securityfocus.com/bid/94498 Third Party Advisory, VDB Entry
Changed Reference Type
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845465 No Types Assigned
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845465 Third Party Advisory
Changed Reference Type
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1639345 No Types Assigned
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1639345 Third Party Advisory
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=1398242 No Types Assigned
https://bugzilla.redhat.com/show_bug.cgi?id=1398242 Issue Tracking, Patch
Changed Reference Type
https://github.com/lxc/lxc/commit/81f466d05f2a89cb4f122ef7f593ff3f279b165c No Types Assigned
https://github.com/lxc/lxc/commit/81f466d05f2a89cb4f122ef7f593ff3f279b165c Patch, Vendor Advisory
Changed Reference Type
https://security-tracker.debian.org/tracker/CVE-2016-8649 No Types Assigned
https://security-tracker.debian.org/tracker/CVE-2016-8649 Third Party Advisory, VDB Entry