KVM in the Linux kernel before 4.8.12, when I/O APIC is enabled, does not properly restrict the VCPU index, which allows guest OS users to gain host OS privileges or cause a denial of service (out-of-bounds array access and host OS crash) via a crafted interrupt request, related to arch/x86/kvm/ioapic.c and arch/x86/kvm/ioapic.h.
References
Configurations
History
No history.
Information
Published : 2016-12-28 07:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-9777
Mitre link : CVE-2016-9777
CVE.ORG link : CVE-2016-9777
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read