Public Date:
917017: CVE-2013-1798 kernel: kvm: out-of-bounds access in ioapic indirect register reads

The MITRE CVE dictionary describes this issue as:

The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application.

Find out more about CVE-2013-1798 from the MITRE CVE dictionary dictionary and NIST NVD.


This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG as they did not provide support for the KVM subsystem.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 5.9
Base Metrics AV:A/AC:H/Au:S/C:C/I:N/A:C
Access Vector Adjacent Network
Access Complexity High
Authentication Single
Confidentiality Impact Complete
Integrity Impact None
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
RHEV Hypervisor for RHEL-6 (rhev-hypervisor6) RHSA-2013:0746 2013-04-23
Red Hat Enterprise Linux Virtualization version 5 (kvm) RHSA-2013:0727 2013-04-09
Red Hat Enterprise Linux version 6 (kernel) RHSA-2013:0744 2013-04-23
Red Hat Enterprise Linux Server EUS (v. 6.3) (kernel) RHSA-2013:0928 2013-06-11
Red Hat Enterprise Linux Server EUS (v. 6.2) (kernel) RHSA-2013:1026 2013-07-09

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 5 kvm Affected
Red Hat Enterprise Linux 5 kernel Not affected


Red Hat would like to thank Andrew Honig of Google for reporting this issue.