[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2017-15306

Date: (C)2017-11-07   (M)2017-11-17
 
CVSS Score: 4.3Access Vector:
Exploitability Subscore: Access Complexity:
Impact Subscore: Authentication:
 Confidentiality:
 Integrity:
 Availability:











The kvm_vm_ioctl_check_extension function in arch/powerpc/kvm/powerpc.c in the Linux kernel before 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) via a KVM_CHECK_EXTENSION KVM_CAP_PPC_HTM ioctl call to /dev/kvm.

Reference:
BID-101693
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac64115a66c18c01745bbd3c47a36b124e5fd8c0
http://openwall.com/lists/oss-security/2017/11/06/6
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11
https://github.com/torvalds/linux/commit/ac64115a66c18c01745bbd3c47a36b124e5fd8c0

© 2013 SecPod Technologies