Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support is vulnerable to a null pointer dereference flaw. It could occur on x86 platform, when emulating an undefined instruction. An attacker could use this flaw to crash the host kernel resulting in DoS.
Find out more about CVE-2016-8630 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue does not affect the versions of the kernel package as shipped with
Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.
This issue affects the version of Linux kernel as shipped with Red Hat Enterprise
Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this
issue.
Base Score | 5.2 |
---|---|
Base Metrics | AV:A/AC:M/Au:S/C:N/I:N/A:C |
Access Vector | Adjacent Network |
Access Complexity | Medium |
Authentication | Single |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Complete |
CVSS3 Base Score | 6.2 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H |
Attack Vector | Adjacent Network |
Attack Complexity | Low |
Privileges Required | High |
User Interaction | None |
Scope | Changed |
Confidentiality | None |
Integrity Impact | None |
Availability Impact | High |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 7 (kernel) | RHSA-2017:0386 | 2017-03-02 |
Red Hat Enterprise Linux for Real Time for NFV (v. 7) (kernel-rt) | RHSA-2017:0387 | 2017-03-02 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise MRG 2 | realtime-kernel | Not affected |
Red Hat Enterprise Linux 6 | kernel | Not affected |
Red Hat Enterprise Linux 5 | kernel | Not affected |