First published: Fri Dec 02 2016(Updated: )
KVM in the Linux kernel before 4.8.12, when I/O APIC is enabled, does not properly restrict the VCPU index, which allows guest OS users to gain host OS privileges or cause a denial of service (out-of-bounds array access and host OS crash) via a crafted interrupt request, related to arch/x86/kvm/ioapic.c and arch/x86/kvm/ioapic.h.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=4.8<4.8.12 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-9777 is high, with a severity value of 7.
CVE-2016-9777 allows guest OS users to gain host OS privileges or cause a denial of service in Linux when I/O APIC is enabled.
Linux versions before 4.8.12 are affected by CVE-2016-9777.
To fix CVE-2016-9777 on Ubuntu, update the linux package to version 4.8.0-37.39 or higher, or version 4.9~ or higher.
You can find more information about CVE-2016-9777 at the following references: [link1], [link2], [link3].