Xen 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by mishandling SYSCALL singlestep during emulation
Reporter | Title | Published | Views | Family All 62 |
---|---|---|---|---|
OSV | CVE-2016-10013 | 26 Jan 201715:59 | – | osv |
OSV | xen - security update | 13 Jan 201700:00 | – | osv |
OSV | xen - security update | 9 May 201700:00 | – | osv |
OSV | xen-4.15.1_01-1.2 on GA media | 15 Jun 202400:00 | – | osv |
Xen Project | x86: Mishandling of SYSCALL singlestep during emulation | 19 Dec 201615:36 | – | xen |
FreeBSD | xen-kernel -- x86: Mishandling of SYSCALL singlestep during emulation | 19 Dec 201600:00 | – | freebsd |
RedhatCVE | CVE-2016-10013 | 20 Dec 201607:17 | – | redhatcve |
Debian CVE | CVE-2016-10013 | 26 Jan 201715:59 | – | debiancve |
UbuntuCve | CVE-2016-10013 | 26 Jan 201700:00 | – | ubuntucve |
Tenable Nessus | FreeBSD : xen-kernel -- x86: Mishandling of SYSCALL singlestep during emulation (942433db-c661-11e6-ae1b-002590263bf5) | 21 Dec 201600:00 | – | nessus |
Source | Link |
---|---|
securityfocus | www.securityfocus.com/bid/94963 |
securitytracker | www.securitytracker.com/id/1037491 |
xenbits | www.xenbits.xen.org/xsa/advisory-204.html |
debian | www.debian.org/security/2017/dsa-3847 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo