In the Linux kernel, the following vulnerability has been resolved:riscv: kvm: Fix out-of-bounds array accessIn kvm_riscv_vcpu_sbi_init() the entry->ext_idx can contain anout-of-bound index. This is used as a special marker for the baseextensions, that cannot be disabled. However, when traversing theextensions, that special marker is not checked prior indexing thearray.Add an out-of-bounds check to the function.
No PoCs from references.
- https://github.com/cku-heise/euvd-api-doc