Description
KVM in the Linux kernel before 4.8.12, when I/O APIC is enabled, does not properly restrict the VCPU index, which allows guest OS users to gain host OS privileges or cause a denial of service (out-of-bounds array access and host OS crash) via a crafted interrupt request, related to arch/x86/kvm/ioapic.c and arch/x86/kvm/ioapic.h.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-10578 | KVM in the Linux kernel before 4.8.12, when I/O APIC is enabled, does not properly restrict the VCPU index, which allows guest OS users to gain host OS privileges or cause a denial of service (out-of-bounds array access and host OS crash) via a crafted interrupt request, related to arch/x86/kvm/ioapic.c and arch/x86/kvm/ioapic.h. |
Ubuntu USN |
USN-3190-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3190-2 | Linux kernel (Raspberry Pi 2) vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T02:59:03.471Z
Reserved: 2016-12-02T00:00:00.000Z
Link: CVE-2016-9777
No data.
Status : Modified
Published: 2016-12-28T07:59:00.510
Modified: 2026-05-06T22:30:45.220
Link: CVE-2016-9777
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN