CVE-2016-9777 in Kernel
Resumen (Inglés)
KVM in the Linux kernel before 4.8.12, when I/O APIC is enabled, does not properly restrict the VCPU index, which allows guest OS users to gain host OS privileges or cause a denial of service (out-of-bounds array access and host OS crash) via a crafted interrupt request, related to arch/x86/kvm/ioapic.c and arch/x86/kvm/ioapic.h.
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Reservar
2016-12-02
Divulgación
2016-12-28
Estado
Confirmado
Voces
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerabilidad | CWE | Exp | Con | CVE |
|---|---|---|---|---|---|
| 94700 | Linux Kernel KVM divulgación de información | 125 | No está definido | Arreglo oficial | CVE-2016-9777 |
Descripción
CPE
CWE
CVSS
Hazañas
Historia
Diferencia
Relacionar
Inteligencia de amenazas
API JSON
API XML
API CSV