The msrmtrrvalid function in arch/x86/kvm/mtrr.c in the Linux kernel before 4.6.1 supports MSR 0x2f8, which allows guest OS users to read or write to the kvmarchvcpu data structure, and consequently obtain sensitive information or cause a denial of service (system crash), via a crafted ioctl call.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-3713.json"
[
{
"id": "CVE-2016-3713-bf319914",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@9842df62004f366b9fed2423e24df10542ee0dc5",
"target": {
"file": "arch/x86/kvm/mtrr.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"101196066033846921664205192126275332504",
"182056525458670532954720668196633906630",
"90647467598817595247951574567263197607",
"196077789425542231693036757889523191241",
"119258988697698457769296765622298402469"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line"
},
{
"id": "CVE-2016-3713-e70f3468",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@9842df62004f366b9fed2423e24df10542ee0dc5",
"target": {
"file": "arch/x86/kvm/mtrr.c",
"function": "msr_mtrr_valid"
},
"digest": {
"function_hash": "186217842141560244112850185560943589796",
"length": 522.0
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function"
}
]