Количество 8
Количество 8

CVE-2016-3157
The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain sensitive information by leveraging I/O port access.

CVE-2016-3157
The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain sensitive information by leveraging I/O port access.

CVE-2016-3157
The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain sensitive information by leveraging I/O port access.
CVE-2016-3157
The __switch_to function in arch/x86/kernel/process_64.c in the Linux ...
GHSA-jpwx-jg65-3x5w
The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain sensitive information by leveraging I/O port access.
ELSA-2016-3657
ELSA-2016-3657: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2016-3656
ELSA-2016-3656: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2016-3529
ELSA-2016-3529: kernel-uek security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2016-3157 The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain sensitive information by leveraging I/O port access. | CVSS3: 7.8 | 0% Низкий | около 9 лет назад |
![]() | CVE-2016-3157 The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain sensitive information by leveraging I/O port access. | CVSS3: 7 | 0% Низкий | больше 9 лет назад |
![]() | CVE-2016-3157 The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain sensitive information by leveraging I/O port access. | CVSS3: 7.8 | 0% Низкий | около 9 лет назад |
CVE-2016-3157 The __switch_to function in arch/x86/kernel/process_64.c in the Linux ... | CVSS3: 7.8 | 0% Низкий | около 9 лет назад | |
GHSA-jpwx-jg65-3x5w The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain sensitive information by leveraging I/O port access. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
ELSA-2016-3657 ELSA-2016-3657: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 8 лет назад | |||
ELSA-2016-3656 ELSA-2016-3656: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 8 лет назад | |||
ELSA-2016-3529 ELSA-2016-3529: kernel-uek security update (IMPORTANT) | около 9 лет назад |
Уязвимостей на страницу