Количество 13
Количество 13
CVE-2016-9382
Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
CVE-2016-9382
Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
CVE-2016-9382
Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
CVE-2016-9382
Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, whic ...
GHSA-6gg6-vw3j-g8pq
Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
SUSE-SU-2016:3273-1
Security update for xen
SUSE-SU-2016:3044-1
Security update for xen
SUSE-SU-2016:3174-1
Security update for xen
SUSE-SU-2016:3156-1
Security update for xen
openSUSE-SU-2016:3134-1
Security update for xen
SUSE-SU-2016:3067-1
Security update for xen
SUSE-SU-2016:3083-1
Security update for xen
openSUSE-SU-2017:0007-1
Security update for xen
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2016-9382 Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode. | CVSS3: 7.8 | 0% Низкий | около 9 лет назад | |
CVE-2016-9382 Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode. | CVSS3: 7.5 | 0% Низкий | около 9 лет назад | |
CVE-2016-9382 Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode. | CVSS3: 7.8 | 0% Низкий | около 9 лет назад | |
CVE-2016-9382 Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, whic ... | CVSS3: 7.8 | 0% Низкий | около 9 лет назад | |
GHSA-6gg6-vw3j-g8pq Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | |
SUSE-SU-2016:3273-1 Security update for xen | около 9 лет назад | |||
SUSE-SU-2016:3044-1 Security update for xen | около 9 лет назад | |||
SUSE-SU-2016:3174-1 Security update for xen | около 9 лет назад | |||
SUSE-SU-2016:3156-1 Security update for xen | около 9 лет назад | |||
openSUSE-SU-2016:3134-1 Security update for xen | около 9 лет назад | |||
SUSE-SU-2016:3067-1 Security update for xen | около 9 лет назад | |||
SUSE-SU-2016:3083-1 Security update for xen | около 9 лет назад | |||
openSUSE-SU-2017:0007-1 Security update for xen | около 9 лет назад |
Уязвимостей на страницу