CVE-2016-10013XEN vulnerability

CWE-2647 documents6 sources
Severity
7.8HIGHNVD
EPSS
0.1%
top 73.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 26
Latest updateMay 17

Description

Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

debiandebian/xen< xen 4.8.0-1 (bookworm)
Debianxen/xen< 4.8.0-1+3
NVDxen/xen4.8.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-wc5c-mc82-hwrm: Xen through 42022-05-17
OSV
CVE-2016-10013: Xen through 42017-01-26

📋Vendor Advisories

2
Red Hat
xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204)2016-12-19
Debian
CVE-2016-10013: xen - Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges ...2016

💬Community

2
Bugzilla
CVE-2016-10013 xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204)2016-12-20
Bugzilla
CVE-2016-10013 xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204) [fedora-all]2016-12-20