First published: Thu Oct 27 2016(Updated: )
A flaw was discovered in the Linux kernels implementation of VFIO. While issuing an IOCTL, the VFIO_DEVICE_SET_IRQS parameter for vfio PCI devices has a state machine confusion bug where specifying VFIO_IRQ_SET_DATA_NONE along with another bit in VFIO_IRQ_SET_DATA_TYPE_MASK in hdr.flags allows integer overflow checks to be skipped for hdr.start/hdr.count. This might allow memory corruption later in vfio_pci_set_msi_trigger() with user access to an appropriate vfio device file, but it seems difficult to usefully exploit in practice. Proposed patch: <a href="https://patchwork.kernel.org/patch/9373631/">https://patchwork.kernel.org/patch/9373631/</a> CVE assignment: <a href="http://seclists.org/oss-sec/2016/q4/251">http://seclists.org/oss-sec/2016/q4/251</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=3.6<3.10.107 | |
Linux Linux kernel | >=3.11<3.12.70 | |
Linux Linux kernel | >=3.13<3.16.39 | |
Linux Linux kernel | >=3.17<3.18.51 | |
Linux Linux kernel | >=3.19<4.1.41 | |
Linux Linux kernel | >=4.2<4.4.65 | |
Linux Linux kernel | >=4.5<4.9 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9083 is a vulnerability in the Linux kernel that allows local users to bypass integer overflow checks and cause memory corruption or other unspecified impact.
CVE-2016-9083 has a severity level of high with a severity value of 7.
CVE-2016-9083 affects Linux kernel versions up to 4.8.11.
Yes, upgrading to Linux kernel version 4.9 or later will fix the vulnerability.
More information about CVE-2016-9083 can be found in the references section of the vulnerability report.