Changes between Initial Version and Version 1 of Ticket #4528, comment 1
- Timestamp:
- 09/21/2019 02:42:48 PM (5 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
Ticket #4528, comment 1
initial v1 4 4 Vendor: 5 5 Versions affected: 6 It looks like this vulnerability was introduced in this commit https://github.com/torvalds/linux/commit/3a4d5c94e959359ece6d6b55045c3f046677f55c, 6 It looks like this vulnerability was introduced in this commit 7 https://github.com/torvalds/linux/commit/3a4d5c94e959359ece6d6b55045c3f046677f55c, 7 8 from kernel version 2.6.34 and fixed in latest stable kernel 5.3. 8 9 }}} 9 10 Tencent Blade Team discovered a QEMU-KVM Guest to Host Kernel Escape Vulnerability which is in vhost/vhost_net kernel module. 10 11 … … 22 23 23 24 In get_indirect, there is the log buffer overflow bug can be triggered as comments below: 24 25 {{{ 25 26 static int get_indirect(struct vhost_virtqueue *vq, 26 27 struct iovec iov[], unsigned int iov_size, … … 120 121 return 0; 121 122 } 122 123 }}} 123 124 Function vhost_get_vq_desc also has above while loop which may cause log buffer overflow. 124 125 {{{ 125 126 Mitigation: 126 127 update to latest stable kernel 5.3 or apply the upstream patch. … … 128 129 https://github.com/torvalds/linux/commit/060423bfdee3f8bc6e2c1bac97de24d5415e2bc4 129 130 https://git.kernel.org/pub/scm/linux/kernel/git/mst/vhost.git/commit/?h=for_linus&id=060423bfdee3f8bc6e2c1bac97de24d5415e2bc4 130 131 }}} 131 132 About the Poof of concept: 132 133 We(Tencent Blade Team) plan to publish simple reproduce steps of this vulnerability about a week later. … … 137 138 --- 138 139 Cradmin of Tencent Blade Team 139 }}} 140