VOMIT (go/vomit) has received an external vulnerability report for the Linux kernel.
Advisory: CVE-2017-15306
Details: http://vomit.googleplex.com/advisory?id=CVE/CVE-2017-15306
CVSS severity score: 4.9/10.0
Description:
The kvm_vm_ioctl_check_extension function in arch/powerpc/kvm/powerpc.c in the Linux kernel before 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) via a KVM_CHECK_EXTENSION KVM_CAP_PPC_HTM ioctl call to /dev/kvm.
This bug was filed by http://go/vomit
Please contact us at vomit-team@google.com if you need any assistance.
Comment 1 by groeck@chromium.org
, Nov 29 2017Labels: Security_Severity-Medium Security_Impact-None Pri-3
Owner: groeck@chromium.org
Status: WontFix (was: Untriaged)
Upstream commit ac64115a66c18 ("KVM: PPC: Fix oops when checking KVM_CAP_PPC_HTM"). Only affects PowerPC images, which we don't support/use. Already fixed in chromeos-4.14. Only affects kernels from v4.7.