Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1400804 - (CVE-2016-9777) CVE-2016-9777 Kernel: kvm: out of bounds memory access via vcpu_id
CVE-2016-9777 Kernel: kvm: out of bounds memory access via vcpu_id
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
impact=important,public=20161123,repo...
: Security
Depends On: 1400805
Blocks: 1398090
  Show dependency treegraph
 
Reported: 2016-12-02 01:37 EST by Prasad J Pandit
Modified: 2018-08-28 18:10 EDT (History)
31 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Prasad J Pandit 2016-12-02 01:37:05 EST
Linux kernel built with the Kernel-based Virtual Machine(CONFIG_KVM) support
is vulnerable to an out-of-bounds memory access issue. It could occur on x86
platform, while servicing I/O APIC requests with larger vcpu_id.

A guest user/process could use this flaw to crash the host kernel resulting in
DoS or it could potentially be used to escalate privileges on a host.

Upstream patch:
---------------
  -> https://git.kernel.org/linus/81cdb259fb6d8c1c4ecfeea389ff5a73c07f5755

Reference:
----------
  -> http://www.openwall.com/lists/oss-security/2016/12/02/2
Comment 1 Prasad J Pandit 2016-12-02 01:38:15 EST
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1400805]
Comment 3 Prasad J Pandit 2016-12-02 01:41:46 EST
Statement:

This issue does not affect the versions of the kernel package as shipped with
Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2.

Note You need to log in before you can comment on or make changes to this bug.